Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography

Size: px
Start display at page:

Download "Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography"

Transcription

1 Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Occupational field Cryptography: Provable Security for Protocols I have a strong background in mathematics, theoretical computer science and cryptography. My research area is focused in Theoretical Cryptography Design and Security Analysis of Cryptographic Protocols. In particular, I am interested in the following topics: { Privacy and Integrity in the Cloud { Zero-Knowledge Proof Systems { Homomorphic Authentication Primitives { Secure Multi-Party Computations { Verifiable Delegation of Computations PhD in cryptography PhD Student, ENS Paris, CNRS/ERC CryptoCloud Project. Efficient Protocols for Privacy and Integrity in the Cloud David Pointcheval, Michele Abdalla Cloud computing is a paradigm in which users lease computing resources from powerful service providers. While cloud computing presents several benefits (such as reduced costs and new business opportunities), it also poses serious security concerns. Indeed, once everything is on the cloud, the surface of attack becomes larger than in the traditional local setting: cloud providers may be negligent in following security policies, they may host malicious insiders, or they may be subject to external attacks. These risks threaten the privacy and integrity of data and computations outsourced by users to the Cloud, and in fact represent an obstacle for many organizations to adopt cloud computing.

2 Academic Awards PGSM Master Programme Paris Graduate School of Mathematical Sciences International Scholarship Program of Fondation Sciences Mathematiques de Paris Research 03/ / / /2015 March-July 2014 Research Intern, IMDEA Software Institute. Madrid On the security of SNARKs in the presence of Oracles Dario Fiore Research Project, Ecole Normale Supérieure. Computer Science Department Password-Protected Secret Sharing David Pointcheval, Michele Abdalla Internship Programme, University UPMC Paris 6. Laboratory LIP6 Finding the hidden structure of a quadratic polynomial system Jean-Charles Faugere Education Parisian Master of Research in Computer Science (MPRI), University Paris 7. Specialisation Cryptography, Coding, and Security s Techniques in cryptography and cryptanalysis Arithmetic algorithms for cryptology Polynomial systems, computer algebra and applications Error correcting codes and applications to cryptography Analysis of algorithms Efficient algorithms in computer algebra Mathematical foundations of automata theory Quantum information and applications Master Degree in Mathematics, University of Bucharest. Faculty of Mathematics and Computer Science Specialisation Cryptography and Code Theory Degree Thesis 2 years Subexponential Factoring Algorithms Alexandru Gica

3 January- June 2012 s Erasmus Exchange Programme, University Claude Bernard Lyon 1. Faculty of Mathematics 1 Semester Set Theory and Model Theory Galois Theory Number Theory and Combinatorics Group Representation Theory Theory of Grobner Bases Bachelor s degree in Mathematics, University of Bucharest. Faculty of Mathematics and Computer Science Specialisation Pure Mathematics Degree Thesis 3 years Elliptic Curves with Applications in Cryptography Catalin Gherghe Conferences and Workshops June 2013 Lecturers Courses June July 2012 Summer School - Number Theory for Cryptography, University of Warwick. Workshop - Number Theory, Geometry and Cryptography The Summer Courses are addressed to PhD students in number theory and closely related areas who have little knowledge of cryptography or the applications of mathematics in cryptography. Dan Bernstein, John Cremona, Andreas Enge, Tanja Lange, Francois Morain, Samir Siksek Dan Bernstein: High Speed Cryptography Andreas Enge: Complex Multiplication of Elliptic Curves Tanja Lange: Discrete Logarithms Francois Morain: Integer Factorisation Summer School Courses, Institut Fourier Grenoble. University Joseph Fourier, CNRS Foliations, Pseudoholomorphic Curves, Applications

4 s October 2011 s The Summer Courses in Grenoble is aimed at researchers and graduate students, its main purpose is to teach foundational material in mathematics and promote the exchange of ideas between researchers. Graduate students get vital complementary training and the opportunity to familiarise themselves with state of the art research in the chosen field. Holomorphic Foliations Hyperbolicity in Complex Manifolds Pseudoholomorphic Curves International Conference, "Romanian Cryptology Days, RCD-2011". The Foreign Intelligence Service SIE Analysis, design and evaluation of cryptographic algorithms Symmetric cryptography and cryptanalysis of block ciphers Security of cryptographic algorithms implementations Design of new hash functions (NIST SHA-3 Competition) Development and implementation of cryptographic systems Security protocols and cloud security August 2011 Summer School Courses, Scuola Matematica Interuniversitaria (SMI). University of Perugia Courses The Summer Courses in Perugia were addressed to graduate or senior students interested in research. The aim of the School is to provide young researchers with a basic training in Mathematics and its applications in various sectors, including Physics, Computer Science, Economics and Finance. In pursuit of this aim, the School organises post-graduate courses addressed to young graduate students, both from Italy and from abroad, and prepares them for attendance to Ph.D. courses, post-graduate Schools and research activities in general. Enrique Arrondo: Algebraic Geometry Vavilov Nikolay Aleksandrovich: Algebra - Lie Algebras and Representation Theory Languages Comprehension Speaking Writing Listening Reading Interaction Production Mother Tongue Romanian C2 C2 C2 C2 C2 Advanced English C1 C2 B2 B2 C1 Advanced French C1 C2 C1 B2 C1 Intermediate Spanish B2 B2 B1 B1 B2 Elementary Italian A2 A2 A1 A1 A1

5 Team Work Teaching Adaptability Social Organisational Computer Programming languages Skills and competences I have worked in various types of research teams for projects in my educational field I enjoy teaching mathematics. My experience in formal teaching consists of lectures, tutorials, and practicals. Private mathematical lessons and hours of tutorial support for the International students. Hours of practice in some elementary schools. I experienced different work environments in the academic programs abroad. Therefore, I am able to easily adapt to changes. I possess verbal and written communication and I am able to relate to a wide range of people. I have also a great sense of listening and negotiation. I have demonstrated leadership and organising, a firm sense of responsibility being the administrative coordinator of my class during the three years of faculty. Ability to work with several Mathematical softwares, including Maple, SAGE, Singular Familiar with C/C++, Python. Other Interests Enjoy sports particularly ski, cycling and running. Love theatre, literature, arts, cinema, music. Love to travel and experience different cultures.

Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, 93430 Villetaneuse, France.

Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, 93430 Villetaneuse, France. Domenico Ruoppolo CV Personal Information First Name Domenico. Last Name Ruoppolo. Date of Birth December 16th, 1985. Place of Birth Naples, Italy. Nationality Italian. Location Address Office B311. Contacts

More information

Fanny Dos Reis. Visiting Assistant Professor, Texas A&M University. September 2006 - May 2008

Fanny Dos Reis. Visiting Assistant Professor, Texas A&M University. September 2006 - May 2008 Fanny Dos Reis Positions Held Visiting Assistant Professor, Texas A&M University. September 2006 - May 2008 Visiting Assistant Professor, University of Lille 1, France. September 2004 - August 2006 Visiting

More information

Italian. Strada di Montevaccino, 34, 38121, Trento, Italy. chiara.marcolla@gmail.com, chiara.marcolla@unito.it.

Italian. Strada di Montevaccino, 34, 38121, Trento, Italy. chiara.marcolla@gmail.com, chiara.marcolla@unito.it. Chiara Marcolla Università di Torino Dipartimento di Matematica Giuseppe Peano Via Carlo Alberto 8, 10123 Torino, Italy (+39) 348 7639117 chiara.marcolla@unito.it Contact information Citizenship Address

More information

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES Ounasser Abid 1, Jaouad Ettanfouhi 2 and Omar Khadir 3 1,2,3 Laboratory of Mathematics, Cryptography and Mechanics, Department of Mathematics, Fstm,

More information

Vitor Manuel Parreira Pereira

Vitor Manuel Parreira Pereira Curriculum vitae PERSONAL INFORMATION Vitor Manuel Parreira Pereira Urbanização Quinta dos Orfãos, Bloco B1, 2º F, 4710-453 Braga (Portugal) +351916801340 vitorm2p@gmail.com pt.linkedin.com/in/vitormppereira

More information

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch

Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch 1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

GTEM TRAINING PROGRAM

GTEM TRAINING PROGRAM GTEM TRAINING PROGRAM 1. Overview The Training Program consist of five modules, which are given in Table 1. A broad description of Table 1: Training modules and dependencies T1: General mathematical skills

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New

More information

National Security Agency Perspective on Key Management

National Security Agency Perspective on Key Management National Security Agency Perspective on Key Management IEEE Key Management Summit 5 May 2010 Petrina Gillman Information Assurance (IA) Infrastructure Development & Operations Technical Director National

More information

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza)

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza) Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, 5 56127 Pisa (Cosenza) paladino@mail.dm.unipi.it Curriculum Vitae Born in Cosenza on August 13, 1980 Education Dec 2008

More information

SCIENCES PO GRENOBLE A Major Multidisciplinary Institute at the Heart of Europe

SCIENCES PO GRENOBLE A Major Multidisciplinary Institute at the Heart of Europe SCIENCES PO GRENOBLE A Major Multidisciplinary Institute at the Heart of Europe OCTOBER 2012 www.sciencespo-grenoble.fr/ Sciences Po Grenoble at the Heart of Europe France 61 000 000 inhabitants Rhône-Alpes

More information

Swiss Joint Master in Computer Science of the Universities of Bern, Neuchâtel and Fribourg

Swiss Joint Master in Computer Science of the Universities of Bern, Neuchâtel and Fribourg Swiss Joint Master in Computer Science of the Universities of Bern, Neuchâtel and Fribourg Your Computer Science Master s Program in Switzerland 1 Graduates of the Swiss Joint Master in Computer Science

More information

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring 2009. Nitesh Saxena Polytechnic University Lecture 1: Introduction CS 6903: Modern Cryptography Spring 2009 Nitesh Saxena Polytechnic University Outline Administrative Stuff Introductory Technical Stuff Some Pointers Course Web Page http://isis.poly.edu/courses/cs6903-s10

More information

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2. CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and

More information

A New Generic Digital Signature Algorithm

A New Generic Digital Signature Algorithm Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study

More information

Associate Prof. Dr. Victor Onomza Waziri

Associate Prof. Dr. Victor Onomza Waziri BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,

More information

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.

More information

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique

More information

Dept. of Financial Information Security

Dept. of Financial Information Security Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators

More information

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,

More information

Elliptic Curve Hash (and Sign)

Elliptic Curve Hash (and Sign) Elliptic Curve Hash (and Sign) (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

Software Development within the SPP1489: Number Theory

Software Development within the SPP1489: Number Theory Software Development within the SPP1489: Number Theory Claus Fieker and Bill Hart, Tommy Hofmann and others September 29, 2015 Computer algebra is incomplete without number theory. Applications: (small

More information

HU Yong. Département de Mathématiques,

HU Yong. Département de Mathématiques, HU Yong Département de Mathématiques Bâtiment 425, Université Paris-Sud 11 15 Rue George Clemenceau 91405, Orsay, France Telephone: +33 (0)1 69 15 57 82 Email: yong.hu2@math.u-psud.fr or hu1983yong@hotmail.com

More information

A Factoring and Discrete Logarithm based Cryptosystem

A Factoring and Discrete Logarithm based Cryptosystem Int. J. Contemp. Math. Sciences, Vol. 8, 2013, no. 11, 511-517 HIKARI Ltd, www.m-hikari.com A Factoring and Discrete Logarithm based Cryptosystem Abdoul Aziz Ciss and Ahmed Youssef Ecole doctorale de Mathematiques

More information

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security

More information

Curriculum Vitae of Paola Boito

Curriculum Vitae of Paola Boito Curriculum Vitae of Paola Boito Personal information Born on 1 st August 1978 in Asolo (TV), Italy. Italian citizenship. E-mail: boito@mathcs.emory.edu boito@mail.dm.unipi.it Homepage: http://www.mathcs.emory.edu/~boito

More information

Advanced Topics in Information Security MAP-I Curricular Unit 2009/2010

Advanced Topics in Information Security MAP-I Curricular Unit 2009/2010 Advanced Topics in Information Security MAP-I Curricular Unit 2009/2010 Summary This document describes a Ph.D. level course, corresponding to a Curriculum Unit credited with 5 ECTS. It is offered jointly

More information

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica

More information

CURRICULUM Bachelor of Business Administration, Degree Programme in International Business

CURRICULUM Bachelor of Business Administration, Degree Programme in International Business CURRICULUM Bachelor of Business Administration, Degree Programme in International Business The Degree Programme in International Business enables you to develop competences required in global business.

More information

CRYPTOG NETWORK SECURITY

CRYPTOG NETWORK SECURITY CRYPTOG NETWORK SECURITY PRINCIPLES AND PRACTICES FOURTH EDITION William Stallings Prentice Hall Upper Saddle River, NJ 07458 'jkfetmhki^^rij^jibwfcmf «MMr""'-^.;

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

RECRUITING PART- TIME or FULL- TIME HIGH SCHOOL TEACHERS FOR EUROPEAN SCHOOL ENGLISH SECTION ITALIAN SECTION - SWALS (4-5 - 6 YEAR)

RECRUITING PART- TIME or FULL- TIME HIGH SCHOOL TEACHERS FOR EUROPEAN SCHOOL ENGLISH SECTION ITALIAN SECTION - SWALS (4-5 - 6 YEAR) Prot. N. 6107/C- 38 del 03/08/2015 RECRUITING PART- TIME or FULL- TIME HIGH SCHOOL TEACHERS FOR EUROPEAN SCHOOL ENGLISH SECTION ITALIAN SECTION - SWALS (4-5 - 6 YEAR) We are recruiting some part- time

More information

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES FACULTY OF CONTEMPORARY SCIENCES AND TECHNOLOGIES STUDY PROGRAMME FOR POSTGRADUATE STUDIES (Master of Science) NAME OF THE PROGRAMME: BUSINESS INFORMATICS STUDIES 262 PROGRAMME DESCRIPTION Business Informatics

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography

More information

Study of algorithms for factoring integers and computing discrete logarithms

Study of algorithms for factoring integers and computing discrete logarithms Study of algorithms for factoring integers and computing discrete logarithms First Indo-French Workshop on Cryptography and Related Topics (IFW 2007) June 11 13, 2007 Paris, France Dr. Abhijit Das Department

More information

Facultad de Informática

Facultad de Informática Technical University of Madrid Founded in 97 and based on the old Engineering Schools from the XVIII and XIX centuries. Schools 0 Schools of Engineering leading to the degree of engineer or architect 9

More information

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage Pranita Bakka 1, Dr. Jayashree Agarkhed 2 1 P.G.Student, Department of Computer Science & Engineering,

More information

DOCTORAL PROGRAMME IN MANAGEMENT ENGINEERING

DOCTORAL PROGRAMME IN MANAGEMENT ENGINEERING DIPARTIMENTO DI INGEGNERIA GESTIONALE DOCTORAL PROGRAMME IN MANAGEMENT ENGINEERING POLITECNICO DI MILANO SCHOOL OF MANAGEMENT 2 INDEX Why Us 4 Key Facts 5 International Research Environment 6 Aims and

More information

Programme Specification (Undergraduate) Date amended: 27 February 2012

Programme Specification (Undergraduate) Date amended: 27 February 2012 Programme Specification (Undergraduate) Date amended: 27 February 2012 1. Programme Title(s) and UCAS code(s): BSc/BA/MMath Mathematics (Including year abroad) (G100/G102/G105) 2. Awarding body or institution:

More information

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN A MULTIDISCIPLINARY INTRODUCTION TO INFORMATION SECURITY Stig F. Mjolsnes Norwegian University ofscience & Technology Trondheim

More information

Master s Degree Programme Computer Science. Revised 2 October 2015

Master s Degree Programme Computer Science. Revised 2 October 2015 Master s Degree Programme Computer Science Revised 2 October 2015 Master s Degree Programme Important choices Structure of the Master s Degree Programme Specialization columns Requirements for the study

More information

CURRICULUM VITAE. 2006-2013 President of the Board of Directors of the Annales des Sciences Mathématiques du Québec.

CURRICULUM VITAE. 2006-2013 President of the Board of Directors of the Annales des Sciences Mathématiques du Québec. CURRICULUM VITAE François Huard Department of Mathematics Bishop s University, Sherbrooke, Québec Canada, J1M1Z7 819-822-9600 (2363) email:fhuard@ubishops.ca Languages: French, English. Citizenship: Canadian

More information

COURSE TITLE COURSE DESCRIPTION

COURSE TITLE COURSE DESCRIPTION COURSE TITLE COURSE DESCRIPTION CS-00X COMPUTING EXIT INTERVIEW All graduating students are required to meet with their department chairperson/program director to finalize requirements for degree completion.

More information

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg 1 The MSc program in computer science Worldwide, computer scientists are in high demand. To cater for this demand,

More information

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming. Elective course in Computer Science University of Macau Faculty of Science and Technology Department of Computer and Information Science SFTW498 Information Security Syllabus 2nd Semester 2011/2012 Part

More information

Information Security Course Specifications2011-2012

Information Security Course Specifications2011-2012 Assiut University Faculty of Computers & Information Information Systems Department Quality Assurance Unit Information Security Course Specifications2011-2012 Relevant program Department offers the program

More information

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements MATHEMATICS Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Paul Feit, PhD Dr. Paul Feit is Professor of Mathematics and Coordinator for Mathematics.

More information

Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results

Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results Dario Catalano Dario Fiore Luca Nizzardo University of Catania Italy IMDEA Software Institute Madrid, Spain

More information

ENGINEERING PROGRAMS IN ENGLISH. www.ece.fr STUDYING IN PARIS

ENGINEERING PROGRAMS IN ENGLISH. www.ece.fr STUDYING IN PARIS ENGINEERING PROGRAMS IN ENGLISH www.ece.fr STUDYING IN PARIS PROGRAMS FOR INTERNATIONAL STUDENTS AT ECE PARIS As an international student, there are several pathways you are able to follow in order to

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd.

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd. Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD 20742 jbelding@math.umd.edu www.math.umd.edu/ jbelding EDUCATION Ph.D. in Mathematics, May 2008 (expected) University

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

Address: Burnside Hall, Room 1018, 805 Sherbrooke Street West, Montreal, Quebec, Canada, H3A0B9 Email: yara.elias@mail.mcgill.ca

Address: Burnside Hall, Room 1018, 805 Sherbrooke Street West, Montreal, Quebec, Canada, H3A0B9 Email: yara.elias@mail.mcgill.ca Curriculum Vitae Yara Elias Address: Burnside Hall, Room 1018, 805 Sherbrooke Street West, Montreal, Quebec, Canada, H3A0B9 Email: yara.elias@mail.mcgill.ca Education: 2015-2016: Postdoctoral fellow at

More information

Mathematics INDIVIDUAL PROGRAM INFORMATION 2014 2015. 866.Macomb1 (866.622.6621) www.macomb.edu

Mathematics INDIVIDUAL PROGRAM INFORMATION 2014 2015. 866.Macomb1 (866.622.6621) www.macomb.edu Mathematics INDIVIDUAL PROGRAM INFORMATION 2014 2015 866.Macomb1 (866.622.6621) www.macomb.edu Mathematics PROGRAM OPTIONS CREDENTIAL TITLE CREDIT HOURS REQUIRED NOTES Associate of Arts Mathematics 62

More information

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: badini_jayanthi@yahoo.co.in MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha

More information

www.telecom-bretagne.eu

www.telecom-bretagne.eu www.telecom-bretagne.eu Brest Telecom Bretagne main campus 2 Telecom Bretagne 3 Telecom Bretagne Brest campus 4 Telecom Bretagne Rennes campus 10 core institutions - 12,500 students Institut Mines-Télécom

More information

Implementation of Elliptic Curve Digital Signature Algorithm

Implementation of Elliptic Curve Digital Signature Algorithm Implementation of Elliptic Curve Digital Signature Algorithm Aqeel Khalique Kuldip Singh Sandeep Sood Department of Electronics & Computer Engineering, Indian Institute of Technology Roorkee Roorkee, India

More information

ÉCOLE CENTRALE PARIS

ÉCOLE CENTRALE PARIS ÉCOLE CENTRALE PARIS May 2014 Pierre LECOY Catherine MARTINEAU-HUYNH International Affairs INTERNATIONAL AFFAIRS 1 ECOLE CENTRALE PARIS I ÉCOLE CENTRALE PARIS Main facts DIRECTION OF INTERNATIONAL AFFAIRS

More information

AN APPROACH TO A BACHELOR PROGRAM ON NETWORK TECHNOLOGIES. Petya Assenova, Nikolay Kirov

AN APPROACH TO A BACHELOR PROGRAM ON NETWORK TECHNOLOGIES. Petya Assenova, Nikolay Kirov МАТЕМАТИКА И МАТЕМАТИЧЕСКО ОБРАЗОВАНИЕ, 2008 MATHEMATICS AND EDUCATION IN MATHEMATICS, 2008 Proceedings of the Thirty Seventh Spring Conference of the Union of Bulgarian Mathematicians Borovetz, April

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc. OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256

More information

Study in English while living in France

Study in English while living in France Fact Sheet 2011-2012 Visiting address: 2, rue Robert d Arbrissel Phone : 00 33 299 54 63 63 3500 Rennes France Fax : 00 33 299 33 08 24 Web : www.esc-rennes.fr Postal address: 2, rue Robert d Arbrissel

More information

Lecture 9: Application of Cryptography

Lecture 9: Application of Cryptography Lecture topics Cryptography basics Using SSL to secure communication links in J2EE programs Programmatic use of cryptography in Java Cryptography basics Encryption Transformation of data into a form that

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

How To Get A Master'S Degree In Mathematics In Norway

How To Get A Master'S Degree In Mathematics In Norway Program description for the Master s Degree Program in Mathematics Name English: Master s Degree program in Mathematics Norwegian, bokmål: Masterprogram i matematikk Norwegian, nynorsk: Masterprogram i

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Digital Signature. Raj Jain. Washington University in St. Louis

Digital Signature. Raj Jain. Washington University in St. Louis Digital Signature Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE. EDUCATION AND EXAMINATION REGULATIONS Academic Year 2012-2013 PART B THE MASTER S PROGRAMME IN LOGIC

UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE. EDUCATION AND EXAMINATION REGULATIONS Academic Year 2012-2013 PART B THE MASTER S PROGRAMME IN LOGIC UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE EDUCATION AND EXAMINATION REGULATIONS Academic Year 2012-2013 PART B THE MASTER S PROGRAMME IN LOGIC September 1 st 2012 Chapter 1 Article 1.1 Article 1.2 Chapter

More information

Lukasz Pater CMMS Administrator and Developer

Lukasz Pater CMMS Administrator and Developer Lukasz Pater CMMS Administrator and Developer EDMS 1373428 Agenda Introduction Why do we need asymmetric ciphers? One-way functions RSA Cipher Message Integrity Examples Secure Socket Layer Single Sign

More information

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification 1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer

More information

İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING DOCTORAL PROGRAM IN COMPUTER ENGINEERING

İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING DOCTORAL PROGRAM IN COMPUTER ENGINEERING İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING DOCTORAL PROGRAM IN COMPUTER ENGINEERING Core Courses CENG 590 CENG 600 CENG 8XX Seminar (0-2)

More information

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center Department of Computer Science Introduction Our society is undergoing a

More information

Faster deterministic integer factorisation

Faster deterministic integer factorisation David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing Faculty of Engineering and Informatics Programme Specification Programme title: MSc Cyber Security Academic Year: 2015/16 Degree Awarding Body: Partner(s), delivery organisation or support provider (if

More information

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a

More information

Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman

Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman Welcome to M2 SCCI 2014-2015 Promotion David Albert Huffman David A. Huffman(1925-1999) [Photo: Don Harris] Grenoble University SCCI - M2P / M2R Security, Cryptology and Coding of Information Systems -

More information

Capture Resilient ElGamal Signature Protocols

Capture Resilient ElGamal Signature Protocols Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics acan@fen.bilkent.edu.tr 2 Bilkent University, Department

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) VCU 1 COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.) The Bachelor of Science in Computer Science is built on a rigorous, highly concentrated, accredited curriculum of computer science courses. The program

More information

Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar

Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar Privacy-Providing Signatures and Their Applications PhD Thesis Author: Somayeh Heidarvand Advisor: Jorge L. Villar Privacy-Providing Signatures and Their Applications by Somayeh Heidarvand In fulfillment

More information

MSc Studies in Computing

MSc Studies in Computing MSc Studies in Computing presented by Department of Computing www.surrey.ac.uk/computing Why University of Surrey? Campus based university everything is in one place study and live on beautiful campus

More information

Cryptography for the Cloud

Cryptography for the Cloud Cryptography for the Cloud ENS - CNRS - INRIA Cyber-Sécurité - SPECIF CNAM, Paris, France - November 7th, 2014 The Cloud Introduction 2 Access from Anywhere Introduction 3 Available for Everything One

More information

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles

More information

SE 4472a / ECE 9064a: Information Security

SE 4472a / ECE 9064a: Information Security Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a / ECE 9064a: Information Security Course Outline 2015-16 Description: This course provides an introduction

More information

Evaluating Security of Cryptographic Algorithm

Evaluating Security of Cryptographic Algorithm MAR. 2013 NEWS No. 426 3 01 MORIAI Shiho 03 AONO Yoshinori 06 07 09 10 MORIAI Shiho Director of Security Fundamentals Laboratory, Network Security Research Institute Graduated in 1993. Joined NICT in 2012

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

Cryptographic mechanisms

Cryptographic mechanisms General Secretariat for National Defence Central Directorate for Information Systems Security PRIME MINISTER Paris, 2007 september 14 No. 1904/SGDN/DCSSI/SDS/LCR Cryptographic mechanisms Rules and recommendations

More information

POLITECNICO DI MILANO SCHOOL OF MANAGEMENT

POLITECNICO DI MILANO SCHOOL OF MANAGEMENT POLITECNICO DI MILANO SCHOOL OF MANAGEMENT Doctoral Programme in Management, Economics and Industrial Engineering Doctoral Programme in Management, Economics and Industrial Engineering KEY FACTS Format:

More information

Curriculum Vitae. Assistant Professor, Indian Statistical Institute, New Delhi, India since July 2010.

Curriculum Vitae. Assistant Professor, Indian Statistical Institute, New Delhi, India since July 2010. Curriculum Vitae Objective I would like to pursue a career in an Institute or University or Organisational setting that will allow me to practice the skills I have begun to develop for research and for

More information

Lecture Notes in Computer Science

Lecture Notes in Computer Science Lecture Notes in Computer Science Edited by G. Goos and J. Hartmanis 218 Advances in Cryptology CRYPTO '85 Proceedings Ischnbcha Hochsthule FACH8ESEICH INFORMAL LLLLL2 T H E K 6 Scichgebiete:- v..: Edited

More information

A blind digital signature scheme using elliptic curve digital signature algorithm

A blind digital signature scheme using elliptic curve digital signature algorithm A blind digital signature scheme using elliptic curve digital signature algorithm İsmail BÜTÜN * and Mehmet DEMİRER *Department of Electrical Engineering, University of South Florida, Tampa, FL, USA Department

More information

Lesson 4: Introduction to network security

Lesson 4: Introduction to network security Lesson 4: Introduction to network security Dr. Justo Carracedo Gallardo carracedo@diatel.upm.es Technical University of Madrid University Professor at the Telecommunication School (EUITT) What is Network

More information