Themen
Es werden aktuelle Paper bevorstehender Konferenzen sowie eigene Ergebnisse vorgestellt und diskutiert. Jeder ist herzlich eingeladen.
Zeit | Raum |
---|---|
Mittwoch, 14:00-16:00 Uhr | NA 5/64 |
Datum | Votragende/r | Thema |
---|---|---|
13.07.11 | Florian Giesen | Programmable Hashfunctions on Lattices (Masterarbeit) |
28.06.11 | Saqip Kakvi | Full Domain Hash RSA revisited |
22.06.11 | Gai Rui | (Masterarbeit) |
08.06.11 | Gottfried Herold | Recent developments in fully homomorphic encryption () |
01.06.11 | Anja Nuss | Logarithmic Signatures in Cryptography |
25.05.11 | Roberto Avanzi | Faster and Lower Memory Scalar Multiplication on Supersingular Curves in Characteristic Three |
18.05.11 | Enrico Thomae | Rank and Differential Attacks against new MQ-Schemes |
04.05.11 | Christopher Wolf | Solving Multivariate Quadratic Equations over Finite Fields |
27.04.11 | Alexander Meurer | Faster Exponential Time Algorithms for the Shortest Vector Problem (SODA 10) ) (Start 16:00) |
20.04.11 | Eike Kiltz | Programmable Hash Functions and Their Applications (CRYPTO'08) |
13.04.11 | Marian Kuhnel | (Masterarbeit) |
10.03.11 | Alexander Meurer | Determinant Sums for Undirected Hamiltonicity (FOCS 10 ) |
02.03.11 | Gottfried Herold | Homomorphic Signatures for Polynomial Functions (EC 11 ) |
02.02.11 | Christopher Wolf | Random knapsack in expected polynomial time. (J. Comput. Syst. Sci. 69(3): 306-329 (2004) / STOC'03 ) |
19.01.11 | Benedikt Driessen | Lösen von Gleichungssystemen mit Analogrechnern |
15.12.10 | Eike Kiltz | Subspace LPN |
08.12.10 | Jannik Pewny | (Bachelorarbeit) |
17.11.10 | Ilya Otzerov | Cryptanalysis of Approximate GCD (Bachelorarbeit) |
10.11.10 | Jasmin Maifeld | Verbesserung von Guos Angriff (Diplomverteidigung) |
06.09.10 | Alexander Meurer | Non-Interactive Verifiable Computing via Fully Homomorphic Encryption |
30.08.10 | Alexander May | Learning Parities with Structured Noise |
26.07.10 | Enrico Thomae, Christopher Wolf |
Lösen multivariater Gleichungen und Anwendungen |
29.06.10 | Lara Dietz | Vergleich ganzzahliger und modularer Methoden zum gitterbasierten Lösen multivariater Gleichungen |
21.06.10 | Enrico Thomae | Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials (PQC10) |
14.06.10 | Alexander Meurer | Solving Lattice Problems in Single Exponential Time based on Voronoi Cell Computations (STOC10) |
17.05.10 | Sven Schäge | Constructing Veriable Random Functions with Large Input Spaces (EC10) |
10.05.10 | Alexander May | Fully Homomorphic Encryption over the Integers (EC10) |
03.05.10 | Christopher Wolf | Mögliches Multivariates Verschlüsselungsschema |
26.04.10 | Mathias Herrmann | Algorithmus von Coppersmith zum Auffinden kleiner Nullstellen |
19.04.10 | Enrico Thomae | Algebraic Cryptanalysis of the PKC'2009 Algebraic Surface Cryptosystem (PKC10) |
13.04.10 | Alexander Meurer | Bonsai Trees, or How to Delegate a Lattice Basis (EC10) |
23.03.10 | Tibor Jager | Adaptive Trapdoor Functions and Chosen-Ciphertext Security (EC10) |
18.03.10 | Mathias Herrmann | Bounded Key-Dependent Message Security (EC10) |
16.03.10 | Enrico Thomae | Algebraic Cryptanalysis of McEliece Variants with Compact Keys (EC10) |
11.03.10 | Alexander Meurer | Lattice enumeration via extreme pruning (EC10) |
09.03.10 | Alexander May | A new generic algorithm for hard knapsacks (EC10) |