Search by date:
1998
|
1999
|
2000
|
2001
|
2002
|
2003
|
2004
|
2005
|
2006
|
2007
|
2008
|
2009
|
2010
|
2011
|
2012
|
2013
|
2014
|
2016
|
2017
|
2018
|
2019
| Forthcoming
If you wish to be informed about our seminars by email,
please contact Francesco Berti, Olivier Pereira or François-Xavier Standaert .
Seminars for the year 1999
March 1999
March 19, 16:30 - The Advanced Encryption Standard process
by Miles Smid
Date: | March 19, 1999 - 16:30 |
Location: | Unspecified location |
Abstract: | The well-known cryptographic algorithm DES will be replaced in very few years. We are in the middle of that process and the main dedicated person will speak about the whole program of standardization. Miles Smid is also the person related to the standization of DES.
|
Link: | |
May 1999
May 07, 14:00 - Electronic Commerce in Intellectual Property
by Stuart Haber
Date: | May 07, 1999 - 14:00 |
Location: | Unspecified location |
Abstract: | The newly widespread availability of information in digital form raises a number of interesting questions about how to design a system for commercial transactions giving consumers access to the information. In the pre-digital world, intellectual-property regulations governed (and govern) many aspects of access to information; it remains to be seen how this will transfer to the digital world. After discussing the requirements that one might desire of a system for commerce in digital intellectual property, the speaker will describe one such system, that of InterTrust Technologies.
|
Link: | |
May 21, 11:00 - Analyse et Verification de Protocoles Cryptographiques
Date: | May 21, 1999 - 11:00 |
Location: | Unspecified location |
Abstract: | Il ne suffit pas d'avoir à disposition des primitives cryptographiques (chiffrement, signature, ...) robustes pour assurer la securité de communications: il est aussi nécessaire de les exploiter correctement dans les protocoles qui les utilisent. La définition de ces protocoles est malheureusement assez subtile et certaines faiblesses majeures de protocoles n'ont été percues que de nombreuses années après leur publication. Le premier exposé aura pour but d'introduire les principales méthodes qui ont été mises en oeuvre pour raisonner sur ces protocoles et vérifier leur efficacité ; tandis que le second approfondira certains problèmes plus spécifiques qui se posent encore actuellement dans ce domaine. |
Link: | Slides of the talk |
September 1999
September 22, 11:00 - Audio and Optical Cryptography and Unconditionally Secure Identification
Date: | September 22, 1999 - 11:00 |
Location: | Unspecified location |
Abstract: | In visual cryptography the additive property of light is used. Also the shares are random and therefore suspect to a censor. In this paper we present new cryptographic schemes which use music and the wave properties of light. The schemes are also secret sharing schemes in which shares are music or images but are not suspect to a human censor. Our schemes guarantee perfect privacy as well as high quality.
We have two variants of audio cryptography. To decrypt the message, in the first method, one just plays two shares on a stereo system. There are two decryption methods which are either based on the interference property of sound or based on the stereo perception of the human hearing system. The disadvantage of the above scheme is that it is limited to a binary cleartext (e.g. Morse code). We have extended the scheme to non-binary audio, such as speech.
Several demos will be given. For example, playing a single channel corresponds with Beethoven music. Playing two channels in stereo reveals a binary cleartext. In the second one playing two channels through a mixer reveals a speech by President Clinton.
We also introduce optical cryptography. We use pictures as covers and the wave interference property of light. The privacy is perfect and the modified images are non-suspicious. The Mach-Zehnder interferometer is used as the decryption machine.
Part of this work is now funded by the National Science Foundation. This is joint work with Shuang Hou, Le Van Tri and Jean-Jacques Quisquater. The presentation is based on papers at Asiacrypt '98 and Information Hiding '99. |
Link: | |
See also: