| Oct 1 | Peter Neumann (SRI) | Security Risks in the Infrastructure | handout |
| Oct 8 | Mihir Bellare (UCSD) | Verifiable cryptographic time capsules with application to key escrow | Slides |
| Oct 15 | Cynthia Dwork (IBM Almaden) | Non-Malleable Cryptography. | |
| Oct 22 | Martin Abadi (DEC SRC) | The Millicent Protocol for Inexpensive Electronic Commerce | |
| Oct 29 | Ian Goldberg (UC Berkeley) | Making Change for Anonymous Payers using DigiCash's Ecash | |
| Nov 5 | Paul C. Kocher | Timing attack against RSA | |
| Nov 12 | No Seminar | ||
| Nov 19 | Andrew Yao (Princeton) | Some Recent Unconventional Attacks on Cryptosystems | |
| Nov 26 | Dan Simon, Microsoft | Cryptography in the Age of Export Control | |
| Dec 3 | Jon Kleinberg (IBM/Cornell) | The Security of Ping-Pong Protocols | |
| Dec 10 | Cynthia Dwork | A Pubic Key Cryptosystem with Worst-Case/Average-Case Equivalence | .
|
John C. Mitchell Department of Computer Science Stanford University Stanford CA 94305-9045 |
Phone: (415) 723-8634 Fax: (415) 725-7411 |
|