APSIA Research Seminar
2022
- Nov 21: Wojciech Jamroga
- Nov 7: Aditya Damodaran
- Sep 26: Ehsan Ebrahimi
- Aug 1: Masoud Tabatabaei
- Jun 27: Georgios Fotiadis
- May 16: Johannes Mueller
- Apr 11: Rafieh Mosaheb
- Mar 28: David Mestel
- Mar 14: Najmeh Soroush
- Feb 28: Marjan Skrobot
2021
- Dec 13: Yan Kim
- Nov 22: Ehsan Estaji
- Nov 8: Ehsan Ebrahimi
- Oct 18: Fatima El Orche: (DNA) Information with a Foreseeable Lifespan
- Oct 4: Aditya Damodaran
- Sep 22: Marie-Laure Zollinger: Understanding, Trust and User Experience in Verifiable, Coercion-Resistant E-Voting
- Jul 1: Jeroen van Wier
- Jun 17: Masoud Tabatabaei
- Jun 3: Marjan Skrobot: Password-Authenticated Public-Key Encryption (PAPKE)
- May 20: Petra Sala
- May 6: Peter Ryan
- Apr 15: David Naccache
- Mar 18: Peter Roenne
- Mar 4: Dimiter Ostrev
- Feb 18: Johannes Mueller: A New Technique for Deniable Vote Updating
- Feb 4: David Mestel: Towards ambiguous digital contact tracing
- Jan 21: Georgios Fotiadis: Secure & Efficient Pairings Today
- Jan 7: Ehsan Estaji
2020
- Dec 17: Fatima El Orche: Time, Privacy, Robustness, Accuracy: Trade offs for Open Vote Network
- Dec 3: Ehsan Ebrahimi: Relations between Quantum IND-CPA notions
- Nov 19: Aditya Damodaran: Unlinkable Updatable Databases and Oblivious Transfer with Access Control
- Nov 5: Hao Cheng: Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers
- Oct 8: Wojciech Jamroga: Pretty Good Strategies for Benaloh Challenge
- Oct 1: Najmeh Soroush: Revisiting Practical and Usable Coercion-Resistant Remote E-Voting
- Sept 24: Yan Kim: Towards Model Checking of Voting Protocols in Uppaal
2018
- Nov 13: Balázs Pejo: The Price of Privacy in Collaborative Learning
- Feb 20: Dimister Ostrev: Introduction to Abstract Cryptography
2017
- Dec 11: Jun Wang: Introduction to Machine Learning (2/2)
- Nov 3: Jun Wang: Introduction to Machine Learning (1/2)
- Oct 18: Najmeh Soroush: Verifiable Inner-Product Encryption
- May 12: Jun Wang: Differentially private neighborhood-base recommender systems
- April 12: Peter Y. A. Ryan: Auditable PAKEs: Approaching Fair Exchange Without a TTP
- March 31: Balazs Pejo: A Game-Theoretic Analysis of Outsourced Computation Verification
2016
- Dec 12: Dimiter Ostrev: The self-testing property of the CHSH(n) non-local games
- Oct 17: Arash Atashpendar: Deniability in Quantum Protocols: A quantum approach towards coercion-resistance
- Sep 22: Alfredo Rial: UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
- Sep 08: Vincenzo Iovino: Verifiable e-voting without trusted parties using one-message NIWI proofs
- July 04: Arash Atashpendar: Explorations in Quantum Protocols
- Mar 24: Balazs Pejo: Protecting Integrity via game theory in outsourced computations
- Feb 25: Dayana Spagnuelo: Patient-Centered Transparency Requirements for Medical Data Sharing Systems
- Feb 19: Jun Wang: Recommender Systems and their security concerns
2015
- Dec 17: Vincenzo Iovino: Deniable Functional Encryption
- Dec 10: Jose Miguel Becerra: An overview of the definitional foundations of Authenticated Key Exchange
- Nov 26: Vincenzo Iovino: On the Possibility of Non-Interactive E-Voting in the Public-Key Setting
- Nov 19: Afonso Arriaga: Functional Encryption for RAM programs
- Oct 27: Arash Atashpendar: New Proofs and Theorems in the Realm of Supersequences and Subsequences
- Aug 06: Miguel: Attribute-Based Signatures with Controllable Linkability
- July 16: Massimo Chenal: Key recovery attacks on some homomorphic encryption schemes
- July 2: Afonso Arriaga: Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
- June 16: Masoud Tabatabaei: Strategic Noninterference
- June 4: Marjan Skrobot: Report on the Real World Cryptography workshop 2015
- May 21: Rosario Giustolisi: Secure Exams without a Trusted Third Party
- April 30: Arash Atashpendar: Information Leakage due to Revealing Randomly Selected Bits
- April 16: Peter Y. A. Ryan: Selene, Voter-Friendly Verifiable Elections
2014
- January 9: Masoud Tabatabaei: Introduction to Process Algebra (1)
- January 23: Masoud Tabatabaei: Introduction to Process Algebra (2)
- February 6: Peter Y. A. Ryan: Process algebraic characterizations of information flow
- March 6: Marjan Skrobot: TBD
- March 13: Miguel Urquidi: TBD
2013
- February 7: Jose Miguel Perez Urquidi: Introduction to Searchable Encryption
- March 7: Masoud Tabatabaei: Preventing. Coercion in E-Voting: Be Open and Commit
- April 11: Qiang Tang: Enhance the Security of Searchable Encryption Schemes
- April 18: Peter Y. A. Ryan: Enhancing and analyzing the BB’84 Quantum Key Establishment protocol
- May 8: Rui Joaquim: Voter Verifiable Complex Ballots Encryption
- May 31: Rosario Giustolisi: A Socio-technical Understanding of TLS Certificate Validation
- July 11: Afonso Arriaga: Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
- August 1: Masoud Tabatabaei: Presenting a proof of Arrow's Theorem
- September 12: Masoud Tabatabaei: Accumulative Knowledge under Bounded Resources
- October 10: Gabriele Lenzini: Cryptographie à la Grecque
- October 18: Massimo Chenal: A Survery of Fully Homomorphic Encryption
- November 7: Jean Lancrenon: hybrid arguments in proofs of security (1)
- November 14: Jean Lancrenon: hybrid arguments in proofs of security (2)
- November 28: Jean Lancrenon: hybrid arguments in proofs of security (3)