Oct 1 | Peter Neumann (SRI) | Security Risks in the Infrastructure | handout |
Oct 8 | Mihir Bellare (UCSD) | Verifiable cryptographic time capsules with application to key escrow | Slides |
Oct 15 | Cynthia Dwork (IBM Almaden) | Non-Malleable Cryptography. | |
Oct 22 | Martin Abadi (DEC SRC) | The Millicent Protocol for Inexpensive Electronic Commerce | |
Oct 29 | Ian Goldberg (UC Berkeley) | Making Change for Anonymous Payers using DigiCash's Ecash | |
Nov 5 | Paul C. Kocher | Timing attack against RSA | |
Nov 12 | No Seminar | ||
Nov 19 | Andrew Yao (Princeton) | Some Recent Unconventional Attacks on Cryptosystems | |
Nov 26 | Dan Simon, Microsoft | Cryptography in the Age of Export Control | |
Dec 3 | Jon Kleinberg (IBM/Cornell) | The Security of Ping-Pong Protocols | |
Dec 10 | Cynthia Dwork | A Pubic Key Cryptosystem with Worst-Case/Average-Case Equivalence | .
John C. Mitchell Department of Computer Science Stanford University Stanford CA 94305-9045 |
Phone: (415) 723-8634 Fax: (415) 725-7411 |
![]() |