No. | Title | Speaker | Time | Venue |
---|---|---|---|---|
57 | Cryptographic Hashing at the Crossroads |
Josef Pieprzyk Macquarie University, Australia |
2008-06-11-2008-06-11 | FIT Building 4-603, Tsinghua University |
56 | The guessing number |
Taoyang Wu Queen Mary, University of London |
2007-06-11-2007-06-11 | FIT Building 4-603, Tsinghua University |
55 | ID-based Cryptography |
Yi Mu University of Wollongong, Australia |
2008-06-11-2008-06-11 | FIT Building 4-603, Tsinghua University |
54 | Optimal Bounds for Predecessor Search and the First Separation between Linear an |
Mikkel Thorup University |
2007-06-07-2007-06-07 | AT&T Labs--Research, Shannon Laboratory |
53 | Double Base Number System and Elliptic Curve Cryptography |
Christophe Doche Macquarie University |
2008-05-28-2008-05-28 | FIT Building 4-603, Tsinghua University |
52 | Optimal Cryptographic Hardness of Learning Monotone Functions |
Andrew Wan Columbia University |
2008-05-28-2008-05-28 | FIT Building 4-603, Tsinghua University |
51 | Priority sampling to estimating arbitrary subset sums |
Mikkel Thorup AT&T Labs--Research, Shannon Laboratory |
2007-06-07-2007-06-07 | Room 6A - 201, Tsinghua University |
50 | Private Branching Programs: On Communication-Efficient Cryptocomputing |
Helger Lipmaa University College London |
2008-05-21-2008-05-21 | FIT Building 4-603, Tsinghua University |
49 | Automatic Generation and Analysis of Attack Graphs |
Jeannette M. Wing Carnegie Mellon University |
2007-06-05-2007-06-05 | FIT Building 4-603, Tsinghua University |
48 | Protocols for Reliable/Secure Message Transmission tolerating Mixed and Mobile A |
Pandu Rangan Chandrasekaran Indian Institute of Technology |
2008-05-14-2008-05-14 | FIT Building 4-603, Tsinghua University |
47 | Perfect Secure Message Transmission |
Pandu Rangan Chandrasekaran Indian Institute of Technology |
2008-05-13-2008-05-13 | FIT Building 4-603, Tsinghua University |
46 | Information Checking Protocol and Verifiable Secret Sharing |
Pandu Rangan Chandrasekaran Indian Institute of Technology |
2008-05-12-2008-05-12 | FIT Building 4-603, Tsinghua University |
45 | “Rules of Work” and My Insights |
Peter Yum Chinese University of Hong Kong |
2008-05-07-2008-05-07 | FIT Building 4-603, Tsinghua University |
44 | A substate theorem in classical and quantum information theory with some applica |
Pranab Sen Tata Institute of Fundamental Research, India |
2008-05-07-2008-05-07 | FIT Building 4-603, Tsinghua University |
43 | Expander graphs - a survey (I) |
Eyal Rozenman California Institute of Technology |
2008-04-25-2008-04-25 | FIT Building 4-603, Tsinghua University |
42 | Probabilistic Graphical Models --- theory, algorithm, and application:Applicatio |
Eric Xing Carnegie Mellon University |
2007-06-07-2007-06-07 | FIT Building 4-603, Tsinghua University |
41 | Quantum walk based search algorithms |
Miklos Santha Universite Paris Sud, Laboratoire de Recherche en Informatique, France |
2008-04-23-2008-04-23 | FIT Building 4-603, Tsinghua University |
40 | The communication complexity of correlation |
Jaikumar Radhakrishnan Tata Institute of Fundamental Research, India |
2008-04-23-2008-04-23 | FIT Building 4-603, Tsinghua University |
39 | Probabilistic Graphical Models --- theory, algorithm, and application:Applicatio |
Eric Xing Carnegie Mellon University |
2007-06-07-2007-06-07 | FIT Building 4-603, Tsinghua University |
38 | Probabilistic Graphical Models --- theory, algorithm, and application:Applicatio |
Eric Xing Carnegie Mellon University |
2007-06-07-2007-06-07 | FIT Building 4-603, Tsinghua University |