NIST Crypto Reading Club
From: NIST
NIST Computer Security Division is hosting Crypto Reading Club talks, to foster research and collaboration. Talks are held biweekly on Wednesday in Room B341, Building 222, from 10:00 AM to 12:00 PM, unless noted otherwise.
Reminders will be sent to subscribers of the Crypto Reading Club List which is open to all. If you want to be included to the Crypto Reading Club List and/or give a talk, please contact Morris J. Dworkin or Meltem Sonmez Turan.
Upcoming Talks
NEW Stefan Lucks, Meltem Sonmez Turan and Morrie Dworkin will give a talk on authenticated encryption, on December 12, 2012.
Sample Previous Talks
2012
Date: |
Speaker: |
Title: |
Nov. 28, 2012 |
Santanu Sarkar |
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents |
Nov. 7, 2012 |
Stefan Lucks |
Key Stretching, Memory Consumption, and the Pebbling Game |
Oct. 31, 2012 |
Oscar Garcia-Morchon |
Towards Fully Collusion-Resistant ID-based Establishment of Pairwise Keys |
Oct. 17, 2012 |
Ketan Mehta |
OPACITY and PLAID Authentication Protocols |
Oct. 3, 2012 |
Stephen Jordan |
Classical and Quantum Circuit Obfuscation with Braids |
Sept. 19, 2012 |
Meltem Sonmez Turan |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Crypto 2012 Best Paper by I. Dinur, O. Dunkelman, N. Keller, A. Shamir |
Aug. 9, 2012 |
Morrie Dworkin |
Any Finite Subgroup of the Multiplicative Group of a Field is Cyclic |
July 25, 2012 |
Arnab Roy |
Big data – WEBINAR |
July 11, 2012 |
Peter Mell |
Overview on Big Data and its Security Implications |
June 27, 2012 |
Luís Brandão |
1-output 2-party Secure Function Evaluation with Malicious Parties |
May 30, 2012 |
Daniel Smith-Tone |
Differential Properties of MPKCs with Multiple Variable Types |
May 16, 2012 |
Arnab Roy |
Relatively-Sound NIZKs and Password-Based Key-Exchange |
May 9, 2012 |
Lars Jonas Andersson |
System on Card |
April 18, 2012 |
Quynh Dang |
Randomized Hashing |
March 7, 2012 |
Ray Perlner |
On Error Correcting Code and Cryptographic Schemes Based on Coding Theory |
Feb. 21, 2012 |
Dr. Anna Lysyanskaya |
Authentication without Identification |
Feb. 8, 2012 |
Lily Chen |
Security in Mobility |
Jan. 25, 2012 |
John Kelsey |
Order Preserving Encryption (OPE) |
Jan. 8, 2012 |
Ismet Sahin |
Random Lines Global Optimization Algorithm |
2011
Date: |
Speaker: |
Title: |
Sept. 22, 2011 |
Wayne Patterson |
The Cryptology of Baseball |
Sept. 14, 2011 |
Filip Zagorski |
An Absentee Voting System |
Aug. 3, 2011 |
Yi-Kai Liu |
Quantum Algorithms for Algebraic Problems |
July 13, 2011 |
Errol Markland Jr. |
Implementing Cryptographic Algorithms |
June 29, 2011 |
John Kelsey |
Side Channel Attacks |
May 18, 2011 |
Cathy Tilton |
Using Biometrics for Authentications |
May 11, 2011 |
Poorvi Vora |
Paperless Independently-Verifiable Voting |
April 27, 2011 |
Tyler Shields |
Dirty Little Secrets: Mobile Apps Invading Your Privacy – WEBINAR |
April 20, 2011 |
Rick Kuhn and Raghu Kacker |
Combinatorial Testing |
April 6, 2011 |
Meltem Sonmez Turan |
Distance Bounding Protocols |
Feb. 23, 2011 |
Sheila Frankel |
Security in IPv6 |
Feb. 9, 2011 |
Serge Egelman |
It’s All About The Benjamins: An empirical study on incentivizing users to ignore security advice |
Jan. 26, 2011 |
Rene Peralta |
Selective-Disclosure Envelopes: Construction and Applications |
2010
Date: |
Speaker: |
Title: |
Dec. 15, 2010 |
Souradyuti Paul |
Mode of Operations of SHA-2 candidates |
Dec. 1, 2010 |
John Kelsey |
“Understanding scam victims: seven principles for systems security” and “The psychology of scams: Provoking and committing errors of judgment” papers |
Nov. 3, 2010 |
Lily Chen |
Tunneled Authentication |
Oct. 6, 2010 |
Meltem Sonmez Turan |
Cryptographic Key Derivation from Passwords |
Sept. 22, 2010 |
Dustin Moody |
Verheul’s Theorem and the Security of Pairing-based Cryptography |
July 28, 2010 |
Mridul Nandi |
Security Notions and Some Popular Examples of Multi party Protocols |
July 7, 2010 |
Allen Roginsky |
Distribution of Prime Numbers |
June 16, 2010 |
Elaine Barker |
Transition of Cryptographic Algorithms and Key Length |
May 5, 2010 |
Francesca Slade |
Classification of Peer Production: The Identification of Malfeasance on Collaborative Online Systems |
April 21, 2010 |
John Kelsey |
Fuzzy Extractors |
April 7, 2010 |
Kerry McKay |
Pseudo-linear Statistical Distinguishers for Block Ciphers |
March 24, 2010 |
Annabelle Lee |
Smart Grid and Related Security Issues |
March 10, 2010 |
Lily Chen |
Authenticated Key Establishment in Practice |
Feb. 24, 2010 |
Bill MacGregor |
Chip and Pin Attack |
Jan. 27, 2010 |
Mridul Nandi |
Zero Knowledge Proofs |
2009
Date: |
Speaker: |
Title: |
Dec. 2, 2009 |
Allen Roginsky |
Authenticated Key Establishment |
Nov. 4, 2009 |
Mridul Nandi |
Primes is in P |
Oct. 21, 2009 |
Allen Roginsky |
Introduction to Bloom Filters |
Oct. 7, 2009 |
Meltem Sonmez Turan |
Introduction to Feedback Shift Registers |
Sept. 9, 2009 |
Souradyuti Paul |
AES Related-Key Attacks |
Aug. 11, 2009 |
Allen Roginsky |
Discrete Logarithm Problem (DLP) and Reduction of DLP over an Elliptic Curve |
July 29, 2009 |
Mridul Nandi |
Security Preserved Padding Methods on MD Hash |
July 8, 2009 |
Radia Perlman |
Privacy-Preserving DRM |
June 17, 2009 |
Mridul Nandi |
Survey on Twenty years of Attack on RSA |
June 3, 2009 |
John Kelsey |
Preimage Attacks on JH |
May 6, 2009 |
Souradyuti Paul |
Cryptanalysis of Shavite and EnRupt |
April 22, 2009 |
Souradyuti Paul |
Cryptanalysis on MD6 and CubeHash |
April 8, 2009 |
Ray Perlner |
Quantum Resistant Public Key Cryptography |
March 25, 2009 |
Lily Chen |
Trusted Platform Technologies |
March 11, 2009 |
Rene Peralta |
Circuits in Crypto Applications |
Jan. 28, 2009 |
Mridul Nandi |
Fast and Secure CBC Type MAC Algorithms |
Jan. 24, 2009 |
Souradyuti Paul |
Hash Cryptanalysis |
2008
Date: |
Speaker: |
Title: |
Dec. 17, 2008 |
Peter Mell |
Cloud Computing Horizons |
Dec. 3, 2008 |
Lee Badger |
Virtualization Models and Security |
Nov. 12, 2008 |
Souradyuti Paul |
Hash Functions |
Oct. 8, 2008 |
Andrew Regenscheid |
General Overview of Cryptographic Voting Schemes |
Sept. 24, 2008 |
Mridul Nandi |
MAC based on Compression Functions |
Aug. 27, 2008 |
Allen Roginsky |
Signcryption |
July 16, 2008 |
Mridul Nandi |
Collision-Resistant Hashing: Towards Making |
March 26, 2008 |
John Kelsey |
On Hash Functions |
Feb. 27, 2008 |
Jose A. Montenegro |
Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs |
Feb. 13, 2008 |
Morrie Dworkin |
GCM Mode |
Jan. 16, 2008 |
John Kelsey |
Hash functions |
2007
Date: |
Speaker: |
Title: |
August 8, 2007 |
John Kelsey |
Discussions on MD4 |
June 20, 2007 |
John Kelsey |
Parallel Collision Search |
June 6, 2007 |
Allen Roginsky |
RSA Digital Signature and its Security |
April 23, 2007 |
Katrin Hoeper |
Security Analysis of EAP Methods |
2006
Date: |
Speaker: |
Title: |
May 09, 2006 |
Rene Peralta |
Weil Pairing |