Past Events, Lectures and Talks

Page 1 of 10 12345678910 >>

Colin Boyd: Secure Deduplication - Models and Optimization
Speaker: Colin Boyd (Norwegian University of Science and Technology (NTNU), Norway)
Abstract Deduplication is a widely used mechanism in cloud storage systems which can greatly...

A cryptographic treatment of secure channels for bidirectional and group communication
Speaker: Dr.Rer.Nat. Giorgia Azzurra Marson (NEC Europe Ltd.)
Abstract:Secure channels allow two or more users to communicate in a confidential and authentic...

Workshop: AI Ethics - The Privacy Challenge
This event will focus on privacy issues surrounding Artificial Intelligence. Enhancing efficiency,...

Workshop des Gemeinsamen Ausschusses zum Umgang mit sicherheitsrelevanter Forschung von DFG und Leopoldina
Freiheit und Verantwortung in den IT-Wissenschaften In den IT-Wissenschaften haben insbesondere in...

Wen Wang - Hardware Architectures for Post-Quantum Cryptography – Key Generator for the Niederreiter Cryptosystem
Speaker: Wen Wang (Yale University)
Abstract: Whether due to advances in classical cryptanalysis methods, or the advent of quantum...

Marc Fischlin: Diffie, Hellman: New Directions in Cryptography
Speaker: Marc Fischlin (TU Darmstadt, Cryptoplexity Group)
Abstract: This talk is the first one in the new seminar series "Reading the Crypto...

Paul van Oorschot: Security as a Science - Are we making progress?
Speaker: Paul van Oorschot (Carleton University, Ottawa, Canada)
Abstract Recent years have seen increasing calls to make security research more “scientific”. Who...

Thomas Wunderer: A Hybrid Lattice Reduction and Quantum Search Attack on LWE
Speaker: Thomas Wunderer (TU Darmstadt, CROSSING P1)
Abstract: Recently, an increasing amount of papers proposing post-quantum schemes also provide...

Nikolaos Alexopoulos: On Using Blockchains in Trust Management for Authentication
Speaker: Nikolaos Alexopoulos (TU Darmstadt)
Abstract: Building trust in the context of the digital world in one of the most important, yet...

Srini Devadas: Sanctum - Towards an Open-Source, Formally-Verified Secure Processor (DLS in Cybersecurity)
Abstract Architectural isolation can be used to secure computation on a remote secure processor...

Page 1 of 10 12345678910 >>

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang