Tuesday, Mar. 2, 2004
12:15 - 1:15 PM
5331 CS
|
University of Wisconsin, Madison ( web)
Department of Computer Sciences ( web)
The Weil pairing
I will be giving a talk on the Weil pairing and how to
compute it. The talk will be elementary and will be geared
to the audience's needs/background. The talk will consist
of two parts, the first one will show why the Weil pairing
exists on Elliptic curves and prove some of the basic
properties of the pairing. The second part will be about
Miller's idea for computing the Weil pairing in randomized
polynomial time. If people are interested we could also go
into how such a pairing can be used to implement Identity
based encryption (i.e., Dan Boneh's work.)
|
Wednesday, Mar. 3, 2004
4 - 5 PM
2310 CS
|
Joint OS/Security Seminar
Douglas Ghormley
Sandia National Laboratories ( web)
Tamper Resistant Software: A Case Study
A difficult but common scenario in computer security is
being required to place confidence in trusted software
running in an untrusted environment. Remote query of a
hardware-based authentication identifier is just such a
scenario. Increasingly, anti-tamper and software
obfuscation techniques are being employed in an attempt to
achieve the level of confidence desired. Recently, the
Systems Assessment and Research Center of Sandia National
Laboratories evaluated one such system. This talk presents
the process of the evaluation, the software's protection
mechanisms and what we did to evade them. The talk
concludes with some observations about anti-tamper
systems, obfuscation, and attackers.
Dr. Ghormley graduated in 1991 with a B.S. with honors in
Computer Engineering from Carnegie Mellon University. In
1998, he obtained his Ph.D. in Computer Science from the
University of California at Berkeley, specializing in
distributed operating systems. He is currently a Principal
Member of the Technical Staff at the Systems Assessment
and Research Center of Sandia National Laboratories where
he is a computer security analyst.
Cookies will be served at 3:30 PM in 2310 CS.
|
Monday, Mar. 29, 2004
4 - 5 PM
3609 EH
|
Postponed, TBA
Department of Mathematics ( web),
University of Wisconsin, Madison ( web)
Cryptology and Object Recognition - A Common Mathemtical
Foundation
Information theory and invariant theory provide powerful
mathematical tools for cryptology and object recognition
respectively. I shall review this and then note that
these can be viewed as aspects of the same problem,
permitting applications of information theory to object
recognition and invariant theory to cryptology.
|
Created and maintained by Mihai Christodorescu (
http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified: Fri Feb 27 14:17:36 Central Standard Time 2004