No. Title Speaker Time Venue
57 Cryptographic Hashing at the Crossroads Josef Pieprzyk
Macquarie University, Australia
2008-06-11-2008-06-11 FIT Building 4-603, Tsinghua University
56 The guessing number Taoyang Wu
Queen Mary, University of London
2007-06-11-2007-06-11 FIT Building 4-603, Tsinghua University
55 ID-based Cryptography Yi Mu
University of Wollongong, Australia
2008-06-11-2008-06-11 FIT Building 4-603, Tsinghua University
54 Optimal Bounds for Predecessor Search and the First Separation between Linear an Mikkel Thorup
University
2007-06-07-2007-06-07 AT&T Labs--Research, Shannon Laboratory
53 Double Base Number System and Elliptic Curve Cryptography Christophe Doche
Macquarie University
2008-05-28-2008-05-28 FIT Building 4-603, Tsinghua University
52 Optimal Cryptographic Hardness of Learning Monotone Functions Andrew Wan
Columbia University
2008-05-28-2008-05-28 FIT Building 4-603, Tsinghua University
51 Priority sampling to estimating arbitrary subset sums Mikkel Thorup
AT&T Labs--Research, Shannon Laboratory
2007-06-07-2007-06-07 Room 6A - 201, Tsinghua University
50 Private Branching Programs: On Communication-Efficient Cryptocomputing Helger Lipmaa
University College London
2008-05-21-2008-05-21 FIT Building 4-603, Tsinghua University
49 Automatic Generation and Analysis of Attack Graphs Jeannette M. Wing
Carnegie Mellon University
2007-06-05-2007-06-05 FIT Building 4-603, Tsinghua University
48 Protocols for Reliable/Secure Message Transmission tolerating Mixed and Mobile A Pandu Rangan Chandrasekaran
Indian Institute of Technology
2008-05-14-2008-05-14 FIT Building 4-603, Tsinghua University
47 Perfect Secure Message Transmission Pandu Rangan Chandrasekaran
Indian Institute of Technology
2008-05-13-2008-05-13 FIT Building 4-603, Tsinghua University
46 Information Checking Protocol and Verifiable Secret Sharing Pandu Rangan Chandrasekaran
Indian Institute of Technology
2008-05-12-2008-05-12 FIT Building 4-603, Tsinghua University
45 “Rules of Work” and My Insights Peter Yum
Chinese University of Hong Kong
2008-05-07-2008-05-07 FIT Building 4-603, Tsinghua University
44 A substate theorem in classical and quantum information theory with some applica Pranab Sen
Tata Institute of Fundamental Research, India
2008-05-07-2008-05-07 FIT Building 4-603, Tsinghua University
43 Expander graphs - a survey (I) Eyal Rozenman
California Institute of Technology
2008-04-25-2008-04-25 FIT Building 4-603, Tsinghua University
42 Probabilistic Graphical Models --- theory, algorithm, and application:Applicatio Eric Xing
Carnegie Mellon University
2007-06-07-2007-06-07 FIT Building 4-603, Tsinghua University
41 Quantum walk based search algorithms Miklos Santha
Universite Paris Sud, Laboratoire de Recherche en Informatique, France
2008-04-23-2008-04-23 FIT Building 4-603, Tsinghua University
40 The communication complexity of correlation Jaikumar Radhakrishnan
Tata Institute of Fundamental Research, India
2008-04-23-2008-04-23 FIT Building 4-603, Tsinghua University
39 Probabilistic Graphical Models --- theory, algorithm, and application:Applicatio Eric Xing
Carnegie Mellon University
2007-06-07-2007-06-07 FIT Building 4-603, Tsinghua University
38 Probabilistic Graphical Models --- theory, algorithm, and application:Applicatio Eric Xing
Carnegie Mellon University
2007-06-07-2007-06-07 FIT Building 4-603, Tsinghua University