In September 2017, this (legacy) site will be replaced with the new site you can see at beta.csrc.nist.rip. At that time, links to this legacy site will be automatically redirected to apporpriate links on the new site.

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

crypto Reading club

NIST Computer Security Division is hosting Crypto Reading Club talks, to foster research and collaboration. Talks are held biweekly on Wednesday in Room B341, Building 222, from 10:00 AM to 12:00 PM, unless noted otherwise.

Reminders will be sent to subscribers of the Crypto Reading Club List. If you want to be included to the Crypto Reading Club List and/or give a talk, please contact Morris J. Dworkin or Meltem Sonmez Turan.

Upcoming Talks

  • August 16, 2017; Michael Davidson; Smart Contract Security

Previous Talks

2017

Date: Speaker: Title:
August 2, 2017 Pavol Zajac On the explicit reduction between MQ and decoding problems
July 19, 2017 Meltem Sonmez-Turan and Cagdas Calik The Multiplicative Complexity of Boolean Functions
May 24, 2017 Jintai Ding RLWE-based authentication and key reuse for RLWE-based key exchanges
May 10, 2017 Yehuda Lindell and Avner Mor An Introduction to Secure Multiparty Computation with Applications to Key Protection
April 26, 2017 Kerry McKay On the Practical (In-)Security of 64-bit Block Ciphers
April 12, 2017 Qiang Tang _Cliptography: Post-Snowden Cryptography_
March 29, 2017 Nicky Mouha http://SHAttered.io/ - The first public collision on SHA-1
March 15, 2017 Betul Durak Breaking the FF3 Format Preserving Encryption Standard over Small Domains
March 1, 2017 David Kravitz ABC Blocks: Auditable Blockchain Communications for Securing User and Device Authentication and Authorization
February 1, 2017 Moses Liskov Accessible Protocol Analysis with the CPSA Tool

 

2016

Date: Speaker: Title:
December 7, 2016 Liqun Chen Anonymous Attestation
November 23, 2016 Nicky Mouha Simpira v2: A Family of Efficient Permutations Using the AES Round Function
November 9, 2016 Ray Perlner Cost analysis of hash collisions: Will quantum computers make SHARCS obsolete
October 26, 2016 Nicky Mouha Insights from the NIST Lightweight Cryptography Workshop 2016
October 12, 2016 Marco Bucci A Fully-Digital Chaos-Based Random Bit Generatory
September 28, 2016 Carl Miller Generating true randomness from quantum measurements
September 14, 2016 Charles Bennett Public randomness: harvesting it, using it, and making it trustworthy
August 31, 2016 Cagdas Calik A Survey on Timed-release Crypto and Crypto Puzzles
August 3, 2016 Daniel Smith-Tone Multivariate Cryptography with “Big” Algebraic Structures
June 22, 2016 Dmitry Cousin Uniformity and Entropies
June 8, 2016 Ray Perlner Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme
May 25, 2016 Rene Peralta Epsilon-biased Ddistributions, What They Are, How We Construct Them, What Are They Good For
April 28, 2016 Ludovic Lescieux Laser technologies for IC security evaluation
April 13, 2016 Angelos Stavrou Leveraging Blockchain-based protocols in IoT systems
March 30, 2016 Francois Dupressoir Verified Security Proofs for Cryptographic Standards -- SHA3”
March 16, 2016 Aishwarya Thiruvengadam 10-Round Feistel is Indifferentiable from an Ideal Cipher
February 3, 2016 Dustin Moody Post-Quantum Cryptography
January 20, 2016 Sharon Keller Cryptographic Algorithm Validation Program
January 15, 2016 Jean-Phillippe Aumasson Password Hashing Competition
January 13, 2016 Jacob Alperin Sheriff Lattice-based cryptography

2015

Date: Speaker: Title:
December 23, 2015 Rene Peralta Random thoughts about randomness, primality, and covering arrays
December 9, 2015 Meltem Sonmez Turan, Magnus Find Multiplicative Complexity
October 14, 2015 Morrie Dworkin Chosen-ciphertext attack to XEX
September 30, 2015 Adam L. Young The Drunk Motorcyclist Protocol for Anonymous Communication
September 16, 2015 Kerry McKay Not all Exports are Good for the Economy: FREAK and Logjam Attacks
September 2, 2015 David McGrew Robustness and Transparency in Cryptography
August 5, 2015 Kerry McKay and Meltem Sonmez Turan Short talks on papers on CRYPTO15
July 22, 2015 Young-Hoon Park Multicast for mobile networks
June 24, 2015 Magnus Gausdal Find On Computing the Multiplicative Complexity
June 10, 2015 Bryan Ford Decentralizing Authorities into Scalable Strongest-Link Cothorities
May 27, 2015 Daniel Smith-Tone Polynomial rings and finite fields
May 13, 2015 Dustin Moody Breaking the Japanese Codes in World War II
April 29, 2015 Christine Task Addressing the Problem of Privacy-preserving Social Network Analysis
April 15, 2015 Dmitry Cousin Why Neural Network Models and What They Can Do?
March 18, 2015 Kerry McKay Intro to Machine Learning for Cryptologist
March 4, 2015 Carl Miller and Yaoyun Shi Quantum Random Number Generation
February 4, 2015 Christine Task Publishing Sensitive Data Safely with Differential Privacy
January 21, 2015 Morrie Dworkin The Riddle of the Labyrinth
January 7, 2015 Meltem Sonmez Turan How Random is your RNG

2014

Date: Speaker: Title:
December 10, 2014 Gedare Bloom MORPH: an FPGA SoC to Defend Against Hardware Trojans
November 12, 2014 Mike Gault and Ken Zatyko Keyless Signature Infrastructure
October 29, 2014 Kerry McKay The block cipher Present
October 15, 2014 Adam O’Neill Relaxed Cryptography for Application-Driven Security
Septemeber 17, 2014 Matt Robshaw UHF RFID, Security, and Future Directions
August 6, 2014 Meltem Sonmez Turan, Ray Perlner, Allen Roginsky, Apostol Vassilev Crypto Small Talks II
July 28, 2014 Magnus Gausdal Find The Relationship Between Multiplicative Complexity and Nonlinearity
July 23, 2014 Yi-Kai Liu, Kerry McKay, Dustin Moody, John Kelsey Crypto Small Talks I
June 25, 2014 Morrie Dworkin The Riddle of the Labyrinth
June 11, 2014 Meltem Sonmez Turan Honeywords: Making Password-Cracking Detectable
May 28, 2014 Ray Perlner Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes
May 14, 2014 Dustin Moody Elliptic Curves: Efficiency, Security, and Standards
April 30, 2014 Vadim Lyubashevsky Lattice Based Cryptography
April 16, 2014 Kerry McKay I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis
April 2, 2014 Dr. Jintai Ding Post-Quantum Cryptography - Multivariate Public Key Cryptography
March 19, 2014 Dr. Tromer, Josh Kanner and Dr. Sasson Moving to a New Paradigm of Trust in Continuous Monitoring of Cloud Computing
March 5, 2014 Rene Peralta NIST Randomness Beacon
Feb 19, 2014 John Kelsey Tor Users Get Routed

2013

Date: Speaker: Title:
Nov 13, 2013 Morrie Dworkin How to Share a Secret
Oct 30, 2013 Kerry A. McKay Introduction and Analysis of Geometric and Polygram Substitution Ciphers
Sept 18, 2013 Santanu Sarkar Cryptanalysis of RSA Variants and Implicit Factorization
Sept 4, 2013 Kyle J. Bunch The Use of Homomorphic Encryption Combined with Configurable Computing for Implementing Information Barriers in a Future Inspection Regime
Aug 7, 2013 Cagdas Calik Nonlinearity Computation for Sparse Boolean Functions
July 24, 2013 Sean Weaver Cryptol
July 10, 2013 John Kelsey Discussion on Bitcoin
June 12, 2013 Kerry McKay Discussion on TLS
May 22, 2013 David McGrew Hash-based Signatures
May 15, 2013 Dustin Moody Fully Homomorphic Encryption
April 17, 2103 Kerry McKay Decrypting Classical Cipher Text Using Markov Chain Monte Carlo
March 20, 2013 Morris J. Dworkin and Meltem Sonmez Turan Tutorial on Differential Cryptanalysis
March 6, 2103 Kerem Varici Differential Analysis of the LED Block Cipher
Jan. 13, 2013 Ray Perlner A Chosen-Ciphertext Attack on the Cipher Block Chaining (CBC) Mode
Jan. 9, 2103 Rene Peralta Four Measures of Nonlinearity

2012

Date: Speaker: Title:
Dec. 12, 2012 Stefan Lucks, Meltem Sonmez Turan and Morrie Dworkin Authenticated Encryption
Nov. 28, 2012 Santanu Sarkar Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents
Nov. 7, 2012 Stefan Lucks Key Stretching, Memory Consumption, and the Pebbling Game
Oct. 31, 2012 Oscar Garcia-Morchon Towards Fully Collusion-Resistant ID-based Establishment of Pairwise Keys
Oct. 17, 2012 Ketan Mehta OPACITY and PLAID Authentication Protocols
Oct. 3, 2012 Stephen Jordan Classical and Quantum Circuit Obfuscation with Braids
Sept. 19, 2012 Meltem Sonmez Turan Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Crypto 2012 Best Paper by I. Dinur, O. Dunkelman, N. Keller, A. Shamir
Aug. 9, 2012 Morrie Dworkin Any Finite Subgroup of the Multiplicative Group of a Field is Cyclic
July 25, 2012 Arnab Roy Big data - WEBINAR
July 11, 2012 Peter Mell Overview on Big Data and its Security Implications
June 27, 2012 Luís Brandão 1-output 2-party Secure Function Evaluation with Malicious Parties
May 30, 2012 Daniel Smith-Tone Differential Properties of MPKCs with Multiple Variable Types
May 16, 2012 Arnab Roy Relatively-Sound NIZKs and Password-Based Key-Exchange
May 9, 2012 Lars Jonas Andersson System on Card
April 18, 2012 Quynh Dang Randomized Hashing
March 7, 2012 Ray Perlner On Error Correcting Code and Cryptographic Schemes Based on Coding Theory
Feb. 21, 2012 Dr. Anna Lysyanskaya Authentication without Identification
Feb. 8, 2012 Lily Chen Security in Mobility
Jan. 25, 2012 John Kelsey Order Preserving Encryption (OPE)
Jan. 8, 2012 Ismet Sahin Random Lines Global Optimization Algorithm

2011

Date: Speaker: Title:
Sept. 22, 2011 Wayne Patterson The Cryptology of Baseball
Sept. 14, 2011 Filip Zagorski An Absentee Voting System
Aug. 3, 2011 Yi-Kai Liu Quantum Algorithms for Algebraic Problems
July 13, 2011 Errol Markland Jr. Implementing Cryptographic Algorithms
June 29, 2011 John Kelsey Side Channel Attacks
May 18, 2011 Cathy Tilton Using Biometrics for Authentications
May 11, 2011 Poorvi Vora Paperless Independently-Verifiable Voting
April 27, 2011 Tyler Shields Dirty Little Secrets: Mobile Apps Invading Your Privacy - WEBINAR
April 20, 2011 Rick Kuhn and Raghu Kacker Combinatorial Testing
April 6, 2011 Meltem Sonmez Turan Distance Bounding Protocols
Feb. 23, 2011 Sheila Frankel Security in IPv6
Feb. 9, 2011 Serge Egelman It's All About The Benjamins: An empirical study on incentivizing users to ignore security advice
Jan. 26, 2011 Rene Peralta Selective-Disclosure Envelopes: Construction and Applications

2010

Date: Speaker: Title:
Dec. 15, 2010 Souradyuti Paul Mode of Operations of SHA-2 candidates
Dec. 1, 2010 John Kelsey “Understanding scam victims: seven principles for systems security” and “The psychology of scams: Provoking and committing errors of judgment” papers
Nov. 3, 2010 Lily Chen Tunneled Authentication
Oct. 6, 2010 Meltem Sonmez Turan Cryptographic Key Derivation from Passwords
Sept. 22, 2010 Dustin Moody Verheul’s Theorem and the Security of Pairing-based Cryptography
July 28, 2010 Mridul Nandi Security Notions and Some Popular Examples of Multi party Protocols
July 7, 2010 Allen Roginsky Distribution of Prime Numbers
June 16, 2010 Elaine Barker Transition of Cryptographic Algorithms and Key Length
May 5, 2010 Francesca Slade Classification of Peer Production: The Identification of Malfeasance on Collaborative Online Systems
April 21, 2010 John Kelsey Fuzzy Extractors
April 7, 2010 Kerry McKay Pseudo-linear Statistical Distinguishers for Block Ciphers
March 24, 2010 Annabelle Lee Smart Grid and Related Security Issues
March 10, 2010 Lily Chen Authenticated Key Establishment in Practice
Feb. 24, 2010 Bill MacGregor Chip and Pin Attack
Jan. 27, 2010 Mridul Nandi Zero Knowledge Proofs

2009

Date: Speaker: Title:
Dec. 2, 2009 Allen Roginsky Authenticated Key Establishment
Nov. 4, 2009 Mridul Nandi Primes is in P
Oct. 21, 2009 Allen Roginsky Introduction to Bloom Filters
Oct. 7, 2009 Meltem Sonmez Turan Introduction to Feedback Shift Registers
Sept. 9, 2009 Souradyuti Paul AES Related-Key Attacks
Aug. 11, 2009 Allen Roginsky Discrete Logarithm Problem (DLP) and Reduction of DLP over an Elliptic Curve
July 29, 2009 Mridul Nandi Security Preserved Padding Methods on MD Hash
July 8, 2009 Radia Perlman Privacy-Preserving DRM
June 17, 2009 Mridul Nandi Survey on Twenty years of Attack on RSA
June 3, 2009 John Kelsey Preimage Attacks on JH
May 6, 2009 Souradyuti Paul Cryptanalysis of Shavite and EnRupt
April 22, 2009 Souradyuti Paul Cryptanalysis on MD6 and CubeHash
April 8, 2009 Ray Perlner Quantum Resistant Public Key Cryptography
March 25, 2009 Lily Chen Trusted Platform Technologies
March 11, 2009 Rene Peralta Circuits in Crypto Applications
Jan. 28, 2009 Mridul Nandi Fast and Secure CBC Type MAC Algorithms
Jan. 24, 2009 Souradyuti Paul Hash Cryptanalysis

2008

Date: Speaker: Title:
Dec. 17, 2008 Peter Mell Cloud Computing Horizons
Dec. 3, 2008 Lee Badger Virtualization Models and Security
Nov. 12, 2008 Souradyuti Paul Hash Functions
Oct. 8, 2008 Andrew Regenscheid General Overview of Cryptographic Voting Schemes
Sept. 24, 2008 Mridul Nandi MAC based on Compression Functions
Aug. 27, 2008 Allen Roginsky Signcryption
July 16, 2008 Mridul Nandi Collision-Resistant Hashing: Towards Making
March 26, 2008 John Kelsey On Hash Functions
Feb. 27, 2008 Jose A. Montenegro Secure Sealed-Bid Online Auctions Using Discreet Cryptographic Proofs
Feb. 13, 2008 Morrie Dworkin GCM Mode
Jan. 16, 2008 John Kelsey Hash functions

2007

Date: Speaker: Title:
August 8, 2007 John Kelsey Discussions on MD4
June 20, 2007 John Kelsey Parallel Collision Search
June 6, 2007 Allen Roginsky RSA Digital Signature and its Security
April 23, 2007 Katrin Hoeper Security Analysis of EAP Methods

2006

Date: Speaker: Title:
May 09, 2006 Rene Peralta Weil Pairing