Subscribe to recieve announcements
 
  Home
|
Archives
|
Technical Advice  

 

   Program Committee:
Simon R. Blackburn
(Royal Holloway, University of London)
Carlos Cid
(Royal Holloway, University of London)
Jintai Ding
(University of Cincinnati)
Jean-Charles Faugere
(Laboratoire d'Informatique de Paris 6)
Martin Kreuzer
(University of Passau)
Alexei Miasnikov
(Stevens Institute of Technology)
Chris Peikert
(Georgia Institute of Technology)
Ludovic Perret
(Laboratoire d'Informatique de Paris 6)

 

   Organizing Committee:
Bob Gilman
(Stevens Institute of Technology)
Alex Myasnikov
(Stevens Institute of Technology)
Alexander Ushakov
(Stevens Institute of Technology )
Susanne Wetzel
(Stevens Institute of Technology )

 

   Contact Information:
Alex Myasnikov
email:   amyasnik stevens.edu    
phone: (201) 216-8598

 

   Our sponsors:

 

 

Previous seminars.

Fall 2012

Sep 20, 2012.   Searching for a secure Public Key Cryptosystem.
Simon R. Blackburn (Royal Holloway, University of London)
Abstract      PDF Slides      Watch the recording ...
 
Oct 18, 2012.   Polynomial time cryptanalysis of the Commutator Key Exchange Protocol and related protocols
Boaz Tsaban (Bar-Ilan University, Ramat Gan )
Abstract      PDF Slides      Watch the recording ...
 
Nov 15, 2012.   Public key exchange using semidirect product of (semi)groups.
Vladimir Shpilrain (The City College of CUNY, New York)
Abstract      PDF Slides      Watch the recording ...
 
Nov 29, 2012.   The Geometry of Rings
Christopher J Peikert (Georgia Institute of Technology)
Abstract      PDF Slides      Watch the recording ...
 

Spring 2012

Feb 09, 2012.   Homomorphic encryption from codes
Andrej Bogdanov (The Chinese University of Hong Kong)
Abstract      PPT Slides      Watch the recording ...
 
Feb 23, 2012.   Algebraic methods to solve lattice problems
Jintai Ding (University of Cincinnati)
Abstract      PDF Slides      Watch the recording ...
 
Mar 08, 2012.   Grobner bases of structured systems and their applications in Cryptology
Pierre-Jean Spaenlehauer (LIP6-Universite Paris 6)
Abstract      PDF Slides      Watch the recording ...
 
Mar 22, 2012.   Confusing Eavesdroppers with Algebraic Number Theory
Camilla Hollanti (University of Turku, Finland)
Abstract      PDF Slides      Watch the recording ...
 
Apr 05, 2012.   Continuous hard-to-invert functions based on tropical constructions
Sergey Nikolenko (Academic University, St.-Petersburg)
Abstract      PDF Slides      Watch the recording ...
 
Apr 19, 2012.   Algebraic Fault Attacks
Martin Kreuzer (University of Passau)
Abstract      PDF Slides      Watch the recording ...
 
May 03, 2012.   Authenticated commutator key-agreement protocol.
Alexander Ushakov (Stevens Institute of Technology)
Abstract      PDF Slides      Watch the recording ...
 
May 17, 2012.   Code Equivalence is Hard for Shor-like Quantum Algorithms
Hang Dinh (Indiana University South Bend)
Abstract      PDF Slides      Watch the recording ...
 

Fall 2011

Sep 29, 2011.   Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3
William Skeith (The City College of CUNY)
Abstract      PDF Slides      Watch the recording ...
 
Oct 13, 2011.  Algorithmic problems on compressed words
Marcus Lohrey (University of Leipzig)
Abstract      PDF Slides      Watch the recording ...
 
Oct 27, 2011.  Algebraic Attacks in Code-based cryptography
Ludovic Perret (Laboratoire d'Informatique de Paris 6)
Abstract      PDF Slides      Watch the recording ...
 
Nov 10, 2011.  Fully Homomorphic Encryption from LWE
Zvika Brakerski (Stanford University)
Abstract      PDF Slides      Watch the recording ...
 
Nov 24, 2011.  Thanksgiving
 
Dec 8, 2011.  Pseudorandom Functions and Lattices
Chris Peikert (Georgia Institute of Technology)
Abstract      PDF Slides      Watch the recording ...
 

Spring 2011

Jan 19, 2011.   Compression and Complexity
Alexei Miasnikov (Stevens Institute of Technology)
Abstract      PDF Slides      Watch the recording ...
 
Feb   2, 2011.   Post-quantum cryptography -- multivariate public key cryptography
Jintai Ding (University of Cincinnati)
Abstract      PDF Slides      Watch the recording ...
 
Feb 16, 2011.   Cryptanalysis of two matrix-based key establishment protocols.
Ciaran Mullan (Royal Holloway, University of London)
Abstract      PDF Slides      Watch the recording ...
 
Mar   2, 2011.   Trapdoors for Lattices: Signatures, Identity-Based Encryption, and Beyond
Chris Peikert (Georgia Institute of Technology)
Abstract      PDF Slides      Watch the recording ...
 
Mar 16, 2011.   Efficient cryptography from generalized compact knapsacks
Vadim Lyubashevsky (École Normale Supérieure, Paris)
Abstract      PDF Slides      Watch the recording ...
 
Mar 30, 2011.   Groebner bases techniques in Cryptography
Ludovic Perret (Laboratoire d'Informatique de Paris 6)
Abstract      PDF Slides      Watch the recording ...
 
Apr 13, 2011.   Groebner bases for non-commutative polynomials and applications to cryptography
Martin Kreuzer (Universitat Passau)
Abstract      PDF Slides      Watch the recording ...
 
Apr 27, 2011.   New Learning Problem with Applications to Cryptography
William Skeith (The City College of New York)
Abstract      PDF Slides      Watch the recording ...
 
May 11, 2011.   New Algorithms for Learning in Presence of Errors
Rong Ge (Princeton University)
Abstract      PDF Slides      Watch the recording ...
 
May 25, 2011.   Polly Cracker Revisited
Martin Albrecht (Université Pierre et Marie Curie)
Abstract      PDF Slides      Watch the recording ...

 
   

For information on the website or other questions please contact
Alex Myasnikov: amyasnik@stevens.edu
(201) 216-8598
Stevens Institute of Technology
Hoboken, NJ