Title |
Speaker |
Date |
---|---|---|

Pollard's rho and lambda methods. |
Nicolas Th�riault |
Jan 14 |

XML security. |
Deniz Ozturk |
Jan 17 |

Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part I. |
Nicolas Th�riault |
Jan 24 |

Reductions of elliptic curves modulo primes. |
Alina Carmen Cojocaru |
Jan 27 |

Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part II. |
Nicolas Th�riault |
Jan 31 |

Enigma. Hagelin and Lorenz cipher and "in depth" attacks, part III. |
Nicolas Th�riault |
Feb 03 |

Computing Reimann-roch spaces in algebraic function fields. |
Farzali Izadi |
Feb 06 |

Authentication and data compression based on polynomial data representation. |
Nikolajs Volkov |
Mar 07 |

p-adic cohomology and hyperelliptic curves, part I. |
Pramathanath Sastry |
Mar 20 |

p-adic cohomology and hyperelliptic curves - practical aspects, part I. |
Pramathanath Sastry |
Mar 21 |

p-adic cohomology and hyperelliptic curves, part II. |
Pramathanath Sastry |
Mar 27 |

p-adic cohomology and hyperelliptic curves - practical aspects, part II. |
Pramathanath Sastry |
Mar 28 |

Summary of the workshop on computational aspects of algebraic curves and cryptography. |
Nicolas Th�riault |
Mar 28 |

Summary of the workshop on computational aspects of algebraic curves and cryptography. |
Satya Mohit |
Mar 28 |

Security analysis of 802.11 and Bluetooth. |
Deniz Ozturk |
Mar 31 |

p-adic cohomology and hyperelliptic curves, part III. |
Pramathanath Sastry |
Apr 03 |

Security aspects of the Blackberry. |
William Colvin |
Apr 11 |

Index calculus attack for hyperelliptic curves of genus 3. |
Nicolas Th�riault |
Apr 14 |

Programming aspects pf the Denef-Vercauteren algorithm. |
Ali Juma |
Apr 25 |

End-to-End security. |
Deniz Ozturk |
May 12 |

Overview of primality testing. |
Roanne Rondina |
May 28 |

The AGM method. |
Pramathanath Sastry |
Jun 04 |

Overview of RADIUS and Kerberos. |
Deniz Ozturk |
Jun 10 |

Web Services and Security. |
Arthur Ryman |
Jun 11 |

Tate Conjectures, part I. |
V. Kumar Murty |
Jun 17 |

Tate Conjectures, part II. |
V. Kumar Murty |
Jun 18 |

Primality Test of Cohen-Lenstra. |
Yi Ouyang |
Jun 25 |

Solving Sparce Linear Systems. |
Nicolas Th�riault |
Jul 08 |

Security analysis of SRP Protocol. |
Zubair Adamjee |
Jul 15 |

Implementation of Elliptic Curve Primitives using MIRACL. |
Roanne Rondina |
Jul 22 |

Grid Computing and its security issues, part I. |
Deniz Ozturk |
Jul 28 |

Cryptographic security of single RSA bit. |
Ali Juma |
Jul 28 |

A Coincidence Theorem for Holomorphic maps to G/P. |
Parameswaran Sankaran |
Jul 29 |

Cohomology of Toric Bundles. |
Parameswaran Sankaran |
Jul 31 |

Computing in the Jacobian of a Hyperelliptic Curve. |
Mohammed Radi Benjelloun |
Aug 06 |

Computing l-isogenies using the p-torsion. |
Mohammed Radi Benjelloun |
Sep 15 |

Theta-Null-Werte: Constructing hyperelliptic cryptosystems. |
Guido Blady |
Sep 29 |

Theta-Null-Werte: Constructing hyperelliptic cryptosystems, part II. |
Guido Blady |
Oct 14 |

Theta-Null-Werte: Constructing hyperelliptic cryptosystems, part III. |
Guido Blady |
Oct 27 |

Fast Elliptic Curves Point Counting Using Gaussian Normal Basis. |
Mohammed Radi Benjelloun |
Nov 18 |

Composability of quantum protocols and applications. |
Debbie Leung |
Nov 25 |

foto by:Jane M Sawyer