No. | 讲座题目 | 主讲人 | 时间 | 地址 |
---|---|---|---|---|
103 | Threshold Public-Key Cryptography |
David Pointcheval Ecole Normale Supérieure, Paris, France |
2008-10-29 14:00-15:00 | FIT Building 4-603, Tsinghua University |
102 | Efficient algorithms for the 2-gathering problem |
Uri Zwick Tel Aviv University |
2008-10-22 13:30-14:30 | FIT Building 4-603, Tsinghua University |
101 | Sparse High-Distance Linear Codes are Locally Testable and Correctable |
Madhu Sudan MIT |
2008-10-10 17:00-17:00 | FIT Building 4-603, Tsinghua University |
100 | Pairing Implementation and Its Application to Cryptography |
Eiji Okamoto The University of Tsukuba |
2008-10-10 16:00-17:00 | FIT Building 4-603, Tsinghua University |
99 | Secure Internet Path Quality Monitoring: Tradeoffs in Security and Efficiency |
David Xiao Princeton University |
2008-06-25 15:00-15:00 | FIT Building 4-603, Tsinghua University |
98 | The Smoothed Complexity of Integer Optimization Problems |
Heiko Roeglin Microsoft Research Asia |
2008-06-25 14:00-15:00 | FIT Building 4-603, Tsinghua University |
97 | Nash Bargaining via Flexible Budget Markets |
Vijay Vazirani Georgia Institute of Technology, USA |
2008-06-20 10:30-11:30 | FIT Building 4-603, Tsinghua University |
96 | Efficient Algorithms for Agnostic Learning |
Adam Klivans University of Texas |
2008-06-12 14:20-15:20 | FIT Building 4-603, Tsinghua University |
95 | Cryptographic Hashing at the Crossroads |
Josef Pieprzyk Macquarie University, Australia |
2008-06-11 16:00-17:00 | FIT Building 4-603, Tsinghua University |
94 | ID-based Cryptography |
Yi Mu University of Wollongong, Australia |
2008-06-11 15:00-16:00 | FIT Building 4-603, Tsinghua University |
93 | Double Base Number System and Elliptic Curve Cryptography |
Christophe Doche Macquarie University |
2008-05-28 16:00-17:00 | FIT Building 4-603, Tsinghua University |
92 | Optimal Cryptographic Hardness of Learning Monotone Functions |
Andrew Wan Columbia University |
2008-05-28 15:00-16:00 | FIT Building 4-603, Tsinghua University |
91 | Private Branching Programs: On Communication-Efficient Cryptocomputing |
Helger Lipmaa University College London |
2008-05-21 13:30-14:30 | FIT Building 4-603, Tsinghua University |
90 | Protocols for Reliable/Secure Message Transmission tolerating Mixed and Mobile A |
Pandu Rangan Chandrasekaran Indian Institute of Technology |
2008-05-14 15:30-16:30 | FIT Building 4-603, Tsinghua University |
89 | Perfect Secure Message Transmission |
Pandu Rangan Chandrasekaran Indian Institute of Technology |
2008-05-13 15:00-17:00 | FIT Building 4-603, Tsinghua University |
88 | Information Checking Protocol and Verifiable Secret Sharing |
Pandu Rangan Chandrasekaran Indian Institute of Technology |
2008-05-12 14:00-15:00 | FIT Building 4-603, Tsinghua University |
87 | “Rules of Work” and My Insights |
Peter Yum Chinese University of Hong Kong |
2008-05-07 16:30-17:00 | FIT Building 4-603, Tsinghua University |
86 | A substate theorem in classical and quantum information theory with some applica |
Pranab Sen Tata Institute of Fundamental Research, India |
2008-05-07 15:30-16:30 | FIT Building 4-603, Tsinghua University |
85 | Expander graphs - a survey (I) |
Eyal Rozenman California Institute of Technology |
2008-04-25 11:00-12:00 | FIT Building 4-603, Tsinghua University |
84 | Quantum walk based search algorithms |
Miklos Santha Universite Paris Sud, Laboratoire de Recherche en Informatique, France |
2008-04-23 16:30-17:30 | FIT Building 4-603, Tsinghua University |