MA 479 / CSSE 490: Cryptography

Student presentations
of recent research in Cryptography

Rose-Hulman Institute of Technology
A joint effort of the
Department of Mathematics
and the Department of Computer Science & Software Engineering
Spring term, 2002-2003

The first table below gives the times and places for the talks.

The second table below repeats that information along with titles of the papers presented:

Day  2nd period  6th period  7th period  8th period  10th period
Tuesday, May 13   Curtis Katinas         
Wednesday, May 14       Olin 167
 
Jeff Kelly 
  Jonathan Huang 
  Olin 167 
  Tony Bergstrom 
  Charles Lehman 
 
Thursday, May 15   Brian Davis 
  Jacob Silvia 
  Moench CL 119
 
Alex van Brunt 
  Bryan Shell 
     
Friday, May 16   Art Doler 
Convocation schedule: 
8:50 to 9:30
  Olin 167
 
Trevor Doll 
Convocation schedule: 
1:20 to 2:00
     
Monday, May 19   Aaron Dubin 
  Drew Kilz 
  Olin 259
 
Jeff Smith 
  Don Conley 
      Olin 157
 
Perry Evans 
  Ben Smeland 
Tuesday, May 20   Brian Davis 
  Jacob Silvia 
  Olin 101
 
Sarah Destremps 
 Todd Grotenhuis 
      Olin 157
 
Patrick Beasley
  Eric Lewandowski 

Day  2nd period  6th period  7th period  8th period  10th period
Tuesday, May 13 Olin 157

Curtis Katinas

Efficient Algorithms for Elliptic Curve Cryptography
       
Wednesday, May 14     Olin 167

Jeff Kelly

Cryptanalysis of MD4

Jonathan Huang
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption
Olin 167

Tony Bergstrom

A Key Recovery Attack on Discrete Log-Based Schemes Using a Prime Order Subgroup

Charles Lehman
Authenticated Key Exchange Provably Secure against the Man-in-the-Middle Attack
 
Thursday, May 15 Olin 157

Brian Davis

PRIMES is in P

Jacob Silvia
PRIMES is in P
Moench CL 119

Alex van Brunt

PRIMES is in P

Bryan Shell
A Simplified AES Algorithm and its Linear and Differential Cryptanalyses
     
Friday, May 16 Olin 157
Convocation schedule:
8:50 to 9:30

Art Doler

A Quick Glance at Quantum Cryptography
and
Practical Aspects of Quantum Cryptographic Key Distribution
Olin 167

Convocation schedule:
1:20 to 2:00

Trevor Doll

Computations with a Deck of Cards
     
Monday, May 19 Olin 157

Aaron Dubin

A Novel Scheme for Securing Image Steganography

Drew Kilz
Dynamic Traitor Tracing
Olin 259

Jeff Smith

FASD: A Fault-tolerant, Adaptable, Scalable, Distributed Search Engine

Don Conley
Constructing Pseudo-Random Permutations with a Prescribed Structure
    Olin 157

Perry Evans

Reed Solomon Codes for Digital Fingerprinting

Ben Smelend
Perfect Zero-Knowledge Arguments for NP Using Any One-Way Permutation
Tuesday, May 20   Olin 101

Sarah Destremps

Buses for Anonymous Message Delivery

Todd Grotenhuis
Translucent Cryptography -- An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer
    Olin 157

Patrick Beasley

Factoring with Two Large Primes (Extended Abstract)

Eric Lewandowski