Startseite // SnT // Research // APSIA // Events // APSIA Research Seminar

APSIA Research Seminar

2022

  • Nov 21: Wojciech Jamroga
  • Nov 7: Aditya Damodaran
  • Sep 26: Ehsan Ebrahimi
  • Aug 1: Masoud Tabatabaei
  • Jun 27: Georgios Fotiadis
  • May 16: Johannes Mueller
  • Apr 11: Rafieh Mosaheb
  • Mar 28: David Mestel
  • Mar 14: Najmeh Soroush
  • Feb 28: Marjan Skrobot

2021

  • Dec 13: Yan Kim
  • Nov 22: Ehsan Estaji
  • Nov 8: Ehsan Ebrahimi
  • Oct 18: Fatima El Orche: (DNA) Information with a Foreseeable Lifespan
  • Oct 4: Aditya Damodaran
  • Sep 22: Marie-Laure Zollinger: Understanding, Trust and User Experience in Verifiable, Coercion-Resistant E-Voting
  • Jul 1: Jeroen van Wier
  • Jun 17: Masoud Tabatabaei
  • Jun 3: Marjan Skrobot: Password-Authenticated Public-Key Encryption (PAPKE)
  • May 20: Petra Sala
  • May 6: Peter Ryan
  • Apr 15: David Naccache
  • Mar 18: Peter Roenne
  • Mar 4: Dimiter Ostrev
  • Feb 18: Johannes Mueller: A New Technique for Deniable Vote Updating
  • Feb 4: David Mestel: Towards ambiguous digital contact tracing
  • Jan 21: Georgios Fotiadis: Secure & Efficient Pairings Today
  • Jan 7: Ehsan Estaji

2020

  • Dec 17: Fatima El Orche: Time, Privacy, Robustness, Accuracy: Trade offs for Open Vote Network
  • Dec 3: Ehsan Ebrahimi: Relations between Quantum IND-CPA notions
  • Nov 19: Aditya Damodaran: Unlinkable Updatable Databases and Oblivious Transfer with Access Control
  • Nov 5: Hao Cheng: Lightweight Post-Quantum Key Encapsulation for 8-bit AVR Microcontrollers
  • Oct 8: Wojciech Jamroga: Pretty Good Strategies for Benaloh Challenge
  • Oct 1: Najmeh Soroush: Revisiting Practical and Usable Coercion-Resistant Remote E-Voting
  • Sept 24: Yan Kim: Towards Model Checking of Voting Protocols in Uppaal

2018

  • Nov 13: Balázs Pejo: The Price of Privacy in Collaborative Learning
  • Feb 20: Dimister Ostrev: Introduction to Abstract Cryptography

2017

  • Dec 11: Jun Wang: Introduction to Machine Learning (2/2)
  • Nov 3: Jun Wang: Introduction to Machine Learning (1/2)
  • Oct 18: Najmeh Soroush: Verifiable Inner-Product Encryption  
  • May 12: Jun Wang: Differentially private neighborhood-base recommender systems
  • April 12: Peter Y. A. Ryan: Auditable PAKEs: Approaching Fair Exchange Without a TTP
  • March 31: Balazs Pejo: A Game-Theoretic Analysis of Outsourced Computation Verification

2016

  • Dec 12: Dimiter Ostrev: The self-testing property of the CHSH(n) non-local games
  • Oct 17: Arash Atashpendar: Deniability in Quantum Protocols: A quantum approach towards coercion-resistance
  • Sep 22: Alfredo Rial: UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
  • Sep 08: Vincenzo Iovino: Verifiable e-voting without trusted parties using one-message NIWI proofs
  • July 04: Arash Atashpendar: Explorations in Quantum Protocols
  • Mar 24: Balazs Pejo: Protecting Integrity via game theory in outsourced computations
  • Feb 25: Dayana Spagnuelo: Patient-Centered Transparency Requirements for Medical Data Sharing Systems
  • Feb 19: Jun Wang: Recommender Systems and their security concerns

2015

  • Dec 17: Vincenzo Iovino: Deniable Functional Encryption
  • Dec 10: Jose Miguel Becerra: An overview of the definitional foundations of Authenticated Key Exchange
  • Nov 26: Vincenzo Iovino: On the Possibility of Non-Interactive E-Voting in the Public-Key Setting
  • Nov 19: Afonso Arriaga: Functional Encryption for RAM programs
  • Oct 27: Arash Atashpendar: New Proofs and Theorems in the Realm of Supersequences and Subsequences
  • Aug 06: Miguel: Attribute-Based Signatures with Controllable Linkability
  • July 16: Massimo Chenal: Key recovery attacks on some homomorphic encryption schemes
  • July 2: Afonso Arriaga: Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation
  • June 16: Masoud Tabatabaei: Strategic Noninterference
  • June 4: Marjan Skrobot: Report on the Real World Cryptography workshop 2015
  • May 21: Rosario Giustolisi: Secure Exams without a Trusted Third Party
  • April 30: Arash Atashpendar: Information Leakage due to Revealing Randomly Selected Bits
  • April 16: Peter Y. A. Ryan: Selene, Voter-Friendly Verifiable Elections

2014

  • January 9: Masoud Tabatabaei: Introduction to Process Algebra (1)
  • January 23: Masoud Tabatabaei: Introduction to Process Algebra (2)
  • February 6: Peter Y. A. Ryan: Process algebraic characterizations of information flow
  • March 6: Marjan Skrobot: TBD
  • March 13: Miguel Urquidi: TBD

2013

  • February 7: Jose Miguel Perez Urquidi: Introduction to Searchable Encryption 
  • March 7: Masoud Tabatabaei: Preventing. Coercion in E-Voting: Be Open and Commit
  • April 11: Qiang Tang: Enhance the Security of Searchable Encryption Schemes
  • April 18: Peter Y. A. Ryan: Enhancing and analyzing the BB’84 Quantum Key Establishment protocol
  • May 8: Rui Joaquim: Voter Verifiable Complex Ballots Encryption
  • May 31: Rosario Giustolisi: A Socio-technical Understanding of TLS Certificate Validation
  • July 11: Afonso Arriaga: Trapdoor Privacy in Asymmetric Searchable Encryption Schemes
  • August 1: Masoud Tabatabaei: Presenting a proof of Arrow's Theorem
  • September 12: Masoud Tabatabaei: Accumulative Knowledge under Bounded Resources
  • October 10: Gabriele Lenzini: Cryptographie à la Grecque
  • October 18: Massimo Chenal: A Survery of Fully Homomorphic Encryption
  • November 7: Jean Lancrenon: hybrid arguments in proofs of security (1)
  • November 14: Jean Lancrenon: hybrid arguments in proofs of security (2)
  • November 28: Jean Lancrenon: hybrid arguments in proofs of security (3)