Coming Seminars:
Presentation Type | Title | Speaker | Venue | Date | Slide |
Passed Seminars: (Aug 2014--Present)
Presentation Type | Title | Speaker | Venue | Date | Slide |
Invited Talk | Analyzing the Internet Stability in Presence of Disasters | Aniello Castiglione | 6.214 | 14/JulY/2016, 2pm-3pm | |
Research Result | Strongly Leakage-Resilient Authenticated Key Exchange | Rongmao Chen | 6.214 | 17/Feb/2016, 2pm-3pm | |
Invited Talk | On the feasibility of Fully Homomorphic Encryption (FHE): A case study of sorting data in the encrypted domain | Praveen Gauravaram | 6.214 | 30/Oct/2015, 11am-12pm | |
Paper Reading | Security Proof of BB-IBE | Jianchang Lai | 6.214 | 10/Aug/2015, 3pm-4.30pm | |
Research Result | Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy | Clementine Gritti | 6.214 | 12/June/2015, 2pm-3pm | |
Research Result | A New General Framework for Secure Public Key Encryption with Keyword Search | Rongmao Chen | 6.214 | 12/June/2015, 2pm-3pm | |
Invited Talk | Identity-Based Identification | Guomin Yang | 6.214 | 29/May/2015, 2pm-3pm | Here |
Research Result | Efficient Modular Exponentiation Based on Multiple Multiplications by a Common Operand | Jean-Marc Robert | 6.214 | 15/May/2015, 2pm-3pm | |
Research Result | Efficient Oblivious Transfer with Retrievable Receiver's Privacy | Weiwei Liu | 6.214 | 1/May/2015, 2pm-3pm | |
Invited Talk | Secure Delegation of Signing Power from Factorization | Yong Yu | 6.214 | 24/April/2015, 2pm-3pm | |
Invited Talk | An Introduction to Quantum Cryptography (I) | Professor Runhua Shi | 6.214 | 10/April/2015, 2pm-3pm | |
Invited Talk | On Robust Ciphers for 3D Content Protection | Alireza Jolfaei | 6.214 | 6/Mar/2015, 2pm-3pm | |
Research Result | Efficient File Sharing in Electronic Health Records | Clementine Gritti | 6.214 | 27/Feb/2015, 2pm-3pm | Here |
Invited Talk | Designing S-boxes with improved side-channel resistance | A/Prof Lejla Batina | 6.214 | 13/Feb/2015, 10.30am-11.30am | |
Research Result | Online/Offline Encryption | Jianchang Lai | 6.214 | 30/Jan/2015, 2pm-3pm | |
Research Result | Efficient CP-ABE Under Decisional Linear Assumption | Tran Viet Xuan Phuong | 6.214 | 16/Jan/2015, 2pm-3pm | Here |
Research Result | An Efficient Privacy-preserving E-coupon System | Weiwei Liu | 6.214 | 09/Jan/2015, 2pm-3pm | Here |
Invited Talk | An Introduction to Public Key Broadcast Encryption | Dr. Leyou Zhang | 6.214 | 18/Dec/2014, 1.30pm-3pm | Here |
Paper Reading | Generic security-enhancing compilers for group key exchange protocols. | Yangguang Tian | 6.214 | 12/Dec/2014, 3.30pm-5pm | Here |
Paper Reading | Dual system encryption: Concept, History and Recent works | Jongkil Kim | 6.214 | 5/Dec/2014, 2pm-3pm | Here |
Invited Talk | Elliptic Curve Scalar Multiplication, Side-Channel Attacks and Counter-measures | Jean-Marc Robert | 6.214 | 28/Nov/2014, 2pm-3pm | Here |
Paper Reading | Hash Proof System | Rongmao Chen | 6.214 | 21/Nov/2014, 2pm-3pm | Here |
Invited Talk | Secure Channel Free Public Key Encryption with Keyword Search | Dr. Xiaofen Wang | 6.214 | 14/Nov/2014, 2pm-3pm | Here |
Invited Talk | Research Guide on Public-Key Cryptography (Lecture 2: Encryption) | Dr. Fuchun Guo | 6.214 | 7/Nov/2014, 2pm-3pm | |
Invited Talk | An Introduction to Authenticated Key Exchange Protocols | Dr. Guomin Yang | 6.214 | 31/Oct/2014, 2pm-3pm | Here |
Research Result | Jhanwar-Barua’s Identity-Based Encryption Revisited | Ibrahim Elashry | 6.214 | 17/Oct/2014, 2pm-3pm | |
Invited Talk | Data privacy in remote data integrity checking for cloud storage | Dr. Yong Yu | 6.214 | 10/Oct/2014, 2pm-3pm | Here |
Paper Reading | Dual Pairing Vector Space | Shiwei Zhang | 6.214 | 3/Oct/2014, 2pm-3pm | Here |
Research Result | Anonymous Proxy Signature with Restricted Traceability | Jiannan Wei | 6.214 | 26/Sep/2014, 2pm-3pm | Here |
Paper Reading | Efficient Identity-Based Encryption Without Random Oracles (Waters IBE 2005) | Weiwei Liu | 6.214 | 19/Sep/2014, 2pm-3pm | Here |
Paper Reading | HMQV: A High-Performance Secure Diffie-Hellman Protocol | Yangguang Tian | 6.214 | 12/Sep/2014, 2pm-3pm | Here |
Paper Reading | Practical Identity-Based Encryption Without Random Oracles (Gentry IBE, 2006) | Yinhao Jiang | 6.214 | 5/Sep/2014, 2pm-3pm | Here |
Paper Reading | A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack (Cramer-Shoup Encryption,1998) | Rongmao Chen | 6.214 | 29/Aug/2014, 2pm-3pm | Here |