Title

Speaker

Date

Pollard's rho and lambda methods.

Nicolas Th�riault

Jan 14

XML security.

Deniz Ozturk

Jan 17

Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part I.

Nicolas Th�riault

Jan 24

Reductions of elliptic curves modulo primes.

Alina Carmen Cojocaru

Jan 27

Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part II.

Nicolas Th�riault

Jan 31

Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part III.

Nicolas Th�riault

Feb 03

Computing Reimann-roch spaces in algebraic function fields.

Farzali Izadi

Feb 06

Authentication and data compression based on polynomial data representation.

Nikolajs Volkov

Mar 07

p-adic cohomology and hyperelliptic curves, part I.

Pramathanath Sastry

Mar 20

p-adic cohomology and hyperelliptic curves - practical aspects, part I.

Pramathanath Sastry

Mar 21

p-adic cohomology and hyperelliptic curves, part II.

Pramathanath Sastry

Mar 27

p-adic cohomology and hyperelliptic curves - practical aspects, part II.

Pramathanath Sastry

Mar 28

Summary of the workshop on computational aspects of algebraic curves and cryptography.

Nicolas Th�riault

Mar 28

Summary of the workshop on computational aspects of algebraic curves and cryptography.

Satya Mohit

Mar 28

Security analysis of 802.11 and Bluetooth.

Deniz Ozturk

Mar 31

p-adic cohomology and hyperelliptic curves, part III.

Pramathanath Sastry

Apr 03

Security aspects of the Blackberry.

William Colvin

Apr 11

Index calculus attack for hyperelliptic curves of genus 3.

Nicolas Th�riault

Apr 14

Programming aspects pf the Denef-Vercauteren algorithm.

Ali Juma

Apr 25

End-to-End security.

Deniz Ozturk

May 12

Overview of primality testing.

Roanne Rondina

May 28

The AGM method.

Pramathanath Sastry

Jun 04

Overview of RADIUS and Kerberos.

Deniz Ozturk

Jun 10

Web Services and Security.

Arthur Ryman

Jun 11

Tate Conjectures, part I.

V. Kumar Murty

Jun 17

Tate Conjectures, part II.

V. Kumar Murty

Jun 18

Primality Test of Cohen-Lenstra.

Yi Ouyang

Jun 25

Solving Sparce Linear Systems.

Nicolas Th�riault

Jul 08

Security analysis of SRP Protocol.

Zubair Adamjee

Jul 15

Implementation of Elliptic Curve Primitives using MIRACL.

Roanne Rondina

Jul 22

Grid Computing and its security issues, part I.

Deniz Ozturk

Jul 28

Cryptographic security of single RSA bit.

Ali Juma

Jul 28

A Coincidence Theorem for Holomorphic maps to G/P.

Parameswaran Sankaran

Jul 29

Cohomology of Toric Bundles.

Parameswaran Sankaran

Jul 31

Computing in the Jacobian of a Hyperelliptic Curve.

Mohammed Radi Benjelloun

Aug 06

Computing l-isogenies using the p-torsion.

Mohammed Radi Benjelloun

Sep 15

Theta-Null-Werte: Constructing hyperelliptic cryptosystems.

Guido Blady

Sep 29

Theta-Null-Werte: Constructing hyperelliptic cryptosystems, part II.

Guido Blady

Oct 14

Theta-Null-Werte: Constructing hyperelliptic cryptosystems, part III.

Guido Blady

Oct 27

Fast Elliptic Curves Point Counting Using Gaussian Normal Basis.

Mohammed Radi Benjelloun

Nov 18

Composability of quantum protocols and applications.

Debbie Leung

Nov 25

foto by:Jane M Sawyer