|  Speaker  
 |  | Title (click for abstract) 
 | Note 
 | 
Oct 15, 2019 
 | Chaoping Xing 
 | Shanghai Jiao Tong University 
 | A brief survey on secure multiparty computation 20191015-Chaoping Xing.pdf 
 |  | 
May 15, 2019??? 
 | Shuhong Gao 
 | Clemson University, USA 
 | Efficient Fully Homomorphic Encryption Schemes 20190515-Shuhong Gao.pdf 
 |  | 
April 22, 2019?? 
 | Adi Shamir 
 | Weizmann Institute of Science, Israel 
 | Improved Key Recovery Attacks on Reduced-Round AES 20190422-Adi Shamir.pdf 
 |  | 
April 12, 2019??? 
 | Chun Guo 
 | Universit′e catholique de Louvain 
 | Leakage-Resilient Authenticated Encryption and a Sponge Instantiation 20190412-Chun Guo.pdf 
 |  | 
April 10, 2019 
 | Yvo Desmedt 
 | University of Texas at Dallas 
 | Secure Multiparty Computation versus Secure Outsourcing 20190410-Yvo Desmedt.pdf 
 |  | 
March 30, 2018 
 | Willi Meier 
 | FHNW University, Switzerland 
 | On the security of small-state stream ciphers 20180330-Willi Meier.pdf 
 |  | 
Oct 21, 2016 
 | Willi Meier 
 | University of Applied Sciences and Arts Northwestern Switzerland 
 | Stream ciphers: old and new directions poster.pdf 
 |  | 
July 28, 2015 
 | Ming-Deh Huang 
 | University of Southern California 
 | Weil descent, last fall degree and the elliptic curve discrete logarithm problem 
 |   | 
June 5, 2015 
 | Zhenfu Cao 
 | East China Normal University 
 | 密码安全的新方向 
 |   | 
July 16, 2014 
 | Guangwu Xu 
 | University of Wisconsin-Milwaukee 
 | Window τ-NAF for Koblitz Curves with Optimal Pre-Computation (II) 
 |   | 
June 6, 2014 
 | Xiaoming Sun 
 | Institute of Computing Technology, CAS 
 | Deterministic Protocol for Shared Q-queue J-choice K-best Secretary Problem 
 |   | 
Jan 9, 2014 
 | Guangwu Xu 
 | University of Wisconsin-Milwaukee 
 | Window τ-NAF for Koblitz Curves with Optimal Pre-Computation 
 |   | 
Sept.2, 2013 
 | Marc Stevens 
 | Centrum Wiskunde & Informatica, Netherlands 
 | Improving Counter-cryptanalysis 
 |   | 
Sept.2, 2013 
 | Gaëtan Leurent 
 | Université Catholique de Louvain, Belgique 
 | New Generic attacks on Hash-based MACs 
 |   | 
July 2, 2013 
 | Guangwu Xu 
 | University of Wisconsin-Milwaukee 
 | An Exponential Sum for Coset: Refinements and Applications 
 |   | 
June 13, 2013 
 | MING-DEH HUANG 
 | UNIVERSITY OF SOUTHERN CALIFORNIA  
 | RECENT DEVELOPMENTS ON TWO PROBLEMS CONCERNING MULTIPLICATIVE GROUPS OF FINITE FIELDS 
 |   | 
May 20, 2013 
 | Phong Q. Nguyen 
 | INRIA / IASTU 
 | Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions 
 |   | 
 | Heng Fan 
 | Institute of Physics, CAS 
 | Some developments in quantum key distributions 
 |   | 
Nov 28, 2012 
 | Jian Guo 
 | Institute for Infocomm Research (I2R), Singapore 
 | Key Recovery Attack on HMAC/NMAC based on Reduced Whirlpool 
 |   |