Computer Sciences Dept.

Computer Security and Cryptography Seminar:
March 2004 Events

Date &
Location
Event
Tuesday, Mar. 2, 2004
12:15 - 1:15 PM
5331 CS
Denis Charles (web)
University of Wisconsin, Madison (web)
Department of Computer Sciences (web)
The Weil pairing

I will be giving a talk on the Weil pairing and how to compute it. The talk will be elementary and will be geared to the audience's needs/background. The talk will consist of two parts, the first one will show why the Weil pairing exists on Elliptic curves and prove some of the basic properties of the pairing. The second part will be about Miller's idea for computing the Weil pairing in randomized polynomial time. If people are interested we could also go into how such a pairing can be used to implement Identity based encryption (i.e., Dan Boneh's work.)

Wednesday, Mar. 3, 2004
4 - 5 PM
2310 CS
Joint OS/Security Seminar
Douglas Ghormley
Sandia National Laboratories (web)
Tamper Resistant Software: A Case Study

A difficult but common scenario in computer security is being required to place confidence in trusted software running in an untrusted environment. Remote query of a hardware-based authentication identifier is just such a scenario. Increasingly, anti-tamper and software obfuscation techniques are being employed in an attempt to achieve the level of confidence desired. Recently, the Systems Assessment and Research Center of Sandia National Laboratories evaluated one such system. This talk presents the process of the evaluation, the software's protection mechanisms and what we did to evade them. The talk concludes with some observations about anti-tamper systems, obfuscation, and attackers.

Dr. Ghormley graduated in 1991 with a B.S. with honors in Computer Engineering from Carnegie Mellon University. In 1998, he obtained his Ph.D. in Computer Science from the University of California at Berkeley, specializing in distributed operating systems. He is currently a Principal Member of the Technical Staff at the Systems Assessment and Research Center of Sandia National Laboratories where he is a computer security analyst.

 Cookies will be served at 3:30 PM in 2310 CS.

Monday, Mar. 29, 2004
4 - 5 PM
3609 EH
Postponed, TBA

Nigel Boston (web)
Department of Mathematics (web), University of Wisconsin, Madison (web)
Cryptology and Object Recognition - A Common Mathemtical Foundation

Information theory and invariant theory provide powerful mathematical tools for cryptology and object recognition respectively. I shall review this and then note that these can be viewed as aspects of the same problem, permitting applications of information theory to object recognition and invariant theory to cryptology.

< Back to the Sec & Crypto seminar schedule

Created and maintained by Mihai Christodorescu (http://www.cs.wisc.edu/~mihai)
Created: Wed Aug 13 10:30:10 CDT 2003
Last modified: Fri Feb 27 14:17:36 Central Standard Time 2004
 
Computer Science | UW Home