Title |
Speaker |
Date |
---|---|---|
Pollard's rho and lambda methods. |
Nicolas Th�riault |
Jan 14 |
XML security. |
Deniz Ozturk |
Jan 17 |
Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part I. |
Nicolas Th�riault |
Jan 24 |
Reductions of elliptic curves modulo primes. |
Alina Carmen Cojocaru |
Jan 27 |
Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part II. |
Nicolas Th�riault |
Jan 31 |
Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part III. |
Nicolas Th�riault |
Feb 03 |
Computing Reimann-roch spaces in algebraic function fields. |
Farzali Izadi |
Feb 06 |
Authentication and data compression based on polynomial data representation. |
Nikolajs Volkov |
Mar 07 |
p-adic cohomology and hyperelliptic curves, part I. |
Pramathanath Sastry |
Mar 20 |
p-adic cohomology and hyperelliptic curves - practical aspects, part I. |
Pramathanath Sastry |
Mar 21 |
p-adic cohomology and hyperelliptic curves, part II. |
Pramathanath Sastry |
Mar 27 |
p-adic cohomology and hyperelliptic curves - practical aspects, part II. |
Pramathanath Sastry |
Mar 28 |
Summary of the workshop on computational aspects of algebraic curves and cryptography. |
Nicolas Th�riault |
Mar 28 |
Summary of the workshop on computational aspects of algebraic curves and cryptography. |
Satya Mohit |
Mar 28 |
Security analysis of 802.11 and Bluetooth. |
Deniz Ozturk |
Mar 31 |
p-adic cohomology and hyperelliptic curves, part III. |
Pramathanath Sastry |
Apr 03 |
Security aspects of the Blackberry. |
William Colvin |
Apr 11 |
Index calculus attack for hyperelliptic curves of genus 3. |
Nicolas Th�riault |
Apr 14 |
Programming aspects pf the Denef-Vercauteren algorithm. |
Ali Juma |
Apr 25 |
End-to-End security. |
Deniz Ozturk |
May 12 |
Overview of primality testing. |
Roanne Rondina |
May 28 |
The AGM method. |
Pramathanath Sastry |
Jun 04 |
Overview of RADIUS and Kerberos. |
Deniz Ozturk |
Jun 10 |
Web Services and Security. |
Arthur Ryman |
Jun 11 |
Tate Conjectures, part I. |
V. Kumar Murty |
Jun 17 |
Tate Conjectures, part II. |
V. Kumar Murty |
Jun 18 |
Primality Test of Cohen-Lenstra. |
Yi Ouyang |
Jun 25 |
Solving Sparce Linear Systems. |
Nicolas Th�riault |
Jul 08 |
Security analysis of SRP Protocol. |
Zubair Adamjee |
Jul 15 |
Implementation of Elliptic Curve Primitives using MIRACL. |
Roanne Rondina |
Jul 22 |
Grid Computing and its security issues, part I. |
Deniz Ozturk |
Jul 28 |
Cryptographic security of single RSA bit. |
Ali Juma |
Jul 28 |
A Coincidence Theorem for Holomorphic maps to G/P. |
Parameswaran Sankaran |
Jul 29 |
Cohomology of Toric Bundles. |
Parameswaran Sankaran |
Jul 31 |
Computing in the Jacobian of a Hyperelliptic Curve. |
Mohammed Radi Benjelloun |
Aug 06 |
Computing l-isogenies using the p-torsion. |
Mohammed Radi Benjelloun |
Sep 15 |
Theta-Null-Werte: Constructing hyperelliptic cryptosystems. |
Guido Blady |
Sep 29 |
Theta-Null-Werte: Constructing hyperelliptic cryptosystems, part II. |
Guido Blady |
Oct 14 |
Theta-Null-Werte: Constructing hyperelliptic cryptosystems, part III. |
Guido Blady |
Oct 27 |
Fast Elliptic Curves Point Counting Using Gaussian Normal Basis. |
Mohammed Radi Benjelloun |
Nov 18 |
Composability of quantum protocols and applications. |
Debbie Leung |
Nov 25 |