From: NIST

NIST Computer Security Division is hosting Crypto Reading Club talks, to foster research and collaboration. Talks are held biweekly on Wednesday in Room B341, Building 222, from 10:00 AM to 12:00 PM, unless noted otherwise.

Reminders will be sent to subscribers of the Crypto Reading Club List which is open to all. If you want to be included to the Crypto Reading Club List and/or give a talk, please contact Morris J. Dworkin or Meltem Sonmez Turan.

Upcoming Talks

NEW Stefan Lucks, Meltem Sonmez Turan and Morrie Dworkin will give a talk on authenticated encryption, on December 12, 2012.

Sample Previous Talks

2012

Date: Speaker: Title:
Nov. 28, 2012 Santanu Sarkar Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
Nov. 7, 2012 Stefan Lucks Key Stretching, Memory Consumption, and the Pebbling Game
Oct. 31, 2012 Oscar Garcia-Morchon Towards Fully Collusion-Resistant ID-based Establishment of Pairwise Keys
Oct. 17, 2012 Ketan Mehta OPACITY and PLAID Authentication Protocols
Oct. 3, 2012 Stephen Jordan Classical and Quantum Circuit Obfuscation with Braids
Sept. 19, 2012 Meltem Sonmez Turan Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Crypto 2012 Best Paper by I. Dinur, O. Dunkelman, N. Keller, A. Shamir
Aug. 9, 2012 Morrie Dworkin Any Finite Subgroup of the Multiplicative Group of a Field is Cyclic
July 25, 2012 Arnab Roy Big data – WEBINAR
July 11, 2012 Peter Mell Overview on Big Data and its Security Implications
June 27, 2012 Luís Brandão 1-output 2-party Secure Function Evaluation with Malicious Parties
May 30, 2012 Daniel Smith-Tone Differential Properties of MPKCs with Multiple Variable Types
May 16, 2012 Arnab Roy Relatively-Sound NIZKs and Password-Based Key-Exchange
May 9, 2012 Lars Jonas Andersson System on Card
April 18, 2012 Quynh Dang Randomized Hashing
March 7, 2012 Ray Perlner On Error Correcting Code and Cryptographic Schemes Based on Coding Theory
Feb. 21, 2012 Dr. Anna Lysyanskaya Authentication without Identification
Feb. 8, 2012 Lily Chen Security in Mobility
Jan. 25, 2012 John Kelsey Order Preserving Encryption (OPE)
Jan. 8, 2012 Ismet Sahin Random Lines Global Optimization Algorithm

2011

Date: Speaker: Title:
Sept. 22, 2011 Wayne Patterson The Cryptology of Baseball
Sept. 14, 2011 Filip Zagorski An Absentee Voting System
Aug. 3, 2011 Yi-Kai Liu Quantum Algorithms for Algebraic Problems
July 13, 2011 Errol Markland Jr. Implementing Cryptographic Algorithms
June 29, 2011 John Kelsey Side Channel Attacks
May 18, 2011 Cathy Tilton Using Biometrics for Authentications
May 11, 2011 Poorvi Vora Paperless Independently-Verifiable Voting
April 27, 2011 Tyler Shields Dirty Little Secrets: Mobile Apps Invading Your Privacy – WEBINAR
April 20, 2011 Rick Kuhn and Raghu Kacker Combinatorial Testing
April 6, 2011 Meltem Sonmez Turan Distance Bounding Protocols
Feb. 23, 2011 Sheila Frankel Security in IPv6
Feb. 9, 2011 Serge Egelman It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice
Jan. 26, 2011 Rene Peralta Selective-Disclosure Envelopes: Construction and Applications

2010

Date: Speaker: Title:
Dec. 15, 2010 Souradyuti Paul Mode of Operations of SHA-2 candidates
Dec. 1, 2010 John Kelsey “Understanding scam victims: seven principles for systems security” and “The psychology of scams: Provoking and committing errors of judgment” papers
Nov. 3, 2010 Lily Chen Tunneled Authentication
Oct. 6, 2010 Meltem Sonmez Turan Cryptographic Key Derivation from Passwords
Sept. 22, 2010 Dustin Moody Verheul’s Theorem and the Security of Pairing-based Cryptography
July 28, 2010 Mridul Nandi Security Notions and Some Popular Examples of Multi party Protocols
July 7, 2010 Allen Roginsky Distribution of Prime Numbers
June 16, 2010 Elaine Barker Transition of Cryptographic Algorithms and Key Length
May 5, 2010 Francesca Slade Classification of Peer Production: The Identification of Malfeasance on Collaborative Online Systems
April 21, 2010 John Kelsey Fuzzy Extractors
April 7, 2010 Kerry McKay Pseudo-linear Statistical Distinguishers for Block Ciphers
March 24, 2010 Annabelle Lee Smart Grid and Related Security Issues
March 10, 2010 Lily Chen Authenticated Key Establishment in Practice
Feb. 24, 2010 Bill MacGregor Chip and Pin Attack
Jan. 27, 2010 Mridul Nandi Zero Knowledge Proofs

2009

Date: Speaker: Title:
Dec. 2, 2009 Allen Roginsky Authenticated Key Establishment
Nov. 4, 2009 Mridul Nandi Primes is in P
Oct. 21, 2009 Allen Roginsky Introduction to Bloom Filters
Oct. 7, 2009 Meltem Sonmez Turan Introduction to Feedback Shift Registers
Sept. 9, 2009 Souradyuti Paul AES Related-Key Attacks
Aug. 11, 2009 Allen Roginsky Discrete Logarithm Problem (DLP) and Reduction of DLP over an Elliptic Curve
July 29, 2009 Mridul Nandi Security Preserved Padding Methods on MD Hash
July 8, 2009 Radia Perlman Privacy-Preserving DRM
June 17, 2009 Mridul Nandi Survey on Twenty years of Attack on RSA
June 3, 2009 John Kelsey Preimage Attacks on JH
May 6, 2009 Souradyuti Paul Cryptanalysis of Shavite and EnRupt
April 22, 2009 Souradyuti Paul Cryptanalysis on MD6 and CubeHash
April 8, 2009 Ray Perlner Quantum Resistant Public Key Cryptography
March 25, 2009 Lily Chen Trusted Platform Technologies
March 11, 2009 Rene Peralta Circuits in Crypto Applications
Jan. 28, 2009 Mridul Nandi Fast and Secure CBC Type MAC Algorithms
Jan. 24, 2009 Souradyuti Paul Hash Cryptanalysis

2008

Date: Speaker: Title:
Dec. 17, 2008 Peter Mell Cloud Computing Horizons
Dec. 3, 2008 Lee Badger Virtualization Models and Security
Nov. 12, 2008 Souradyuti Paul Hash Functions
Oct. 8, 2008 Andrew Regenscheid General Overview of Cryptographic Voting Schemes
Sept. 24, 2008 Mridul Nandi MAC based on Compression Functions
Aug. 27, 2008 Allen Roginsky Signcryption
July 16, 2008 Mridul Nandi Collision-Resistant Hashing: Towards Making
March 26, 2008 John Kelsey On Hash Functions
Feb. 27, 2008 Jose A. Montenegro Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs
Feb. 13, 2008 Morrie Dworkin GCM Mode
Jan. 16, 2008 John Kelsey Hash functions

2007

Date: Speaker: Title:
August 8, 2007 John Kelsey Discussions on MD4
June 20, 2007 John Kelsey Parallel Collision Search
June 6, 2007 Allen Roginsky RSA Digital Signature and its Security
April 23, 2007 Katrin Hoeper Security Analysis of EAP Methods

2006

Date: Speaker: Title:
May 09, 2006 Rene Peralta Weil Pairing