Wednesday, March 8, 7pm -- UW Allen Center 303
- Real Random Numbers
- The Cracking of Enigma
- Smart Cards' Onboard Cryptographic Functions
- Random Bit Generators
- Introduction to Braid Group Cryptography
- Anonymity and friends: Keeping the act of communication private
- An Introduction to Identity-Based Cryptography
- Origin and Nature of Allied Cryptographic Advantage in WWII
- In the CA I Trust - A look at Certification Authorities
- Security flaws of the existing electronic voting systems
- Cryptographic Features of the Trusted Platform Module
- Code Obfuscation and its limits in todays software & hardware
- 802.11b Security
Thursday, March 9, 7pm -- Microsoft 113/1159
- Cryptography gone Mobile: Current Research on Limiting Factors
- Privacy Preserving Data Mining
- The Attestation Mechanism in Trusted Computing
- Uncoercible and deniable encryption, or lying with impunity
- A Brief History of Factorization Techniques
- E-Money
- DRM and Key Revocation
- Analysis of Remote Timing Attacks against OpenSSL
- Cryptographics: cryptography on graphical processing units
- Digital Cash
- Practical Aspects of Modern Steganography
- Software Watermarking
- File System and Full Volume Encryption
- Analysis of standard OCSP protocol and an approach to improve it
- Estimating a Lower Bound on the Entropy of HTTPS Public Keys
- Using Graphics Processing Unit in Block Cipher
- Digital Watermarking
Friday, March 10, 7pm -- Microsoft 113/1159
- Database Encryptions
- Cracking Enigma
- Implementations of Challenge-Response Authentication
- WS-Trust
- Distributed Authorization Models
- Cryptanalysis of Modern Ciphers
- The Content Scrambling System
- Web Services-Federation: Managing Identity in a Federated Model
- 802.16 security architecture
- Secure Real Time Communication
- Attacks on the RSA Cryptosystem
- Quantum Cryptography
- Steganography and Digital Watermarking -- Applications, Attacks and Countermeasures
- Neural Nets and Cryptography
- A Review of High Performance RSA Implementations
Saturday, March 11, 10am -- UW Allen Center 303
- "Chinese" Attacks on Hashes
- Threshold RSA Cryptography
- Factoring RSA Moduli: Current State of the Art
- The role of cryptography in combating software piracy
- Cryptography and RFID: Analysis of the TI DST40
- Biometric Encryption and Authentication
- WPA Security and Exploits
- WS Secure Conversation - Let's Talk In Private
- Poking holes in knapsack cryptosystems
- Fingerprint Security
- Steganography and Digital Watermarking
- Elliptic Curve Cryptography: What is it good for?
- Design and Analysis of Security Protocols
- Overview of Electronic Cash