Anca Nitulescu. PhD Student. Personal information. Occupational field. PhD in cryptography



Similar documents
Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, Villetaneuse, France.

Fanny Dos Reis. Visiting Assistant Professor, Texas A&M University. September May 2008

Italian. Strada di Montevaccino, 34, 38121, Trento, Italy.

NEW DIGITAL SIGNATURE PROTOCOL BASED ON ELLIPTIC CURVES

Vitor Manuel Parreira Pereira

Table of Contents. Bibliografische Informationen digitalisiert durch

Information Security and Cryptography

GTEM TRAINING PROGRAM

CPSC 467b: Cryptography and Computer Security

CRYPTOGRAPHY AND NETWORK SECURITY

National Security Agency Perspective on Key Management

Curriculum Vitae. Education. Laura Paladino Dipartimento di Matematica Università di Pisa Largo Bruno Pontecorvo, Pisa (Cosenza)

SCIENCES PO GRENOBLE A Major Multidisciplinary Institute at the Heart of Europe

Swiss Joint Master in Computer Science of the Universities of Bern, Neuchâtel and Fribourg

Lecture 1: Introduction. CS 6903: Modern Cryptography Spring Nitesh Saxena Polytechnic University

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

A New Generic Digital Signature Algorithm

Associate Prof. Dr. Victor Onomza Waziri

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Dept. of Financial Information Security

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Elliptic Curve Hash (and Sign)

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

HU Yong. Département de Mathématiques,

A Factoring and Discrete Logarithm based Cryptosystem

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

Curriculum Vitae of Paola Boito

NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA

CURRICULUM Bachelor of Business Administration, Degree Programme in International Business

CRYPTOG NETWORK SECURITY

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

RECRUITING PART- TIME or FULL- TIME HIGH SCHOOL TEACHERS FOR EUROPEAN SCHOOL ENGLISH SECTION ITALIAN SECTION - SWALS ( YEAR)

FACULTY STUDY PROGRAMME FOR POSTGRADUATE STUDIES

Computer Security: Principles and Practice

Study of algorithms for factoring integers and computing discrete logarithms

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

DOCTORAL PROGRAMME IN MANAGEMENT ENGINEERING

Programme Specification (Undergraduate) Date amended: 27 February 2012

INFORMATION SECURITY A MULTIDISCIPLINARY. Stig F. Mjolsnes INTRODUCTION TO. Norwegian University ofscience & Technology. CRC Press

Master s Degree Programme Computer Science. Revised 2 October 2015

CURRICULUM VITAE President of the Board of Directors of the Annales des Sciences Mathématiques du Québec.

COURSE TITLE COURSE DESCRIPTION

Swiss Joint Master in Computer Science of the universities of Bern, Neuchâtel and Fribourg

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

Information Security Course Specifications

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements

Ensuring Integrity in Cloud Computing via Homomorphic Digital Signatures: new tools and results

ENGINEERING PROGRAMS IN ENGLISH. STUDYING IN PARIS

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

Juliana V. Belding Department of Mathematics The University of Maryland College Park, MD

Certificate in Cyber Security

Address: Burnside Hall, Room 1018, 805 Sherbrooke Street West, Montreal, Quebec, Canada, H3A0B9

Mathematics INDIVIDUAL PROGRAM INFORMATION Macomb1 ( )

Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud

Implementation of Elliptic Curve Digital Signature Algorithm

ÉCOLE CENTRALE PARIS

Information and Communications Technology Courses at a Glance

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Study in English while living in France

Lecture 9: Application of Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

How To Get A Master'S Degree In Mathematics In Norway

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Digital Signature. Raj Jain. Washington University in St. Louis

UNIVERSITY OF AMSTERDAM FACULTY OF SCIENCE. EDUCATION AND EXAMINATION REGULATIONS Academic Year PART B THE MASTER S PROGRAMME IN LOGIC

Lukasz Pater CMMS Administrator and Developer

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

Faster deterministic integer factorisation

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Nettitude Ltd. (FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. British Computer Society (BCS) Master s Degree in Computing

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Welcome to M2 SCCI Promotion David Albert Huffman

Capture Resilient ElGamal Signature Protocols

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Using etoken for SSL Web Authentication. SSL V3.0 Overview

COMPUTER SCIENCE, BACHELOR OF SCIENCE (B.S.)

Privacy-Providing Signatures and Their Applications. PhD Thesis. Author: Somayeh Heidarvand. Advisor: Jorge L. Villar

MSc Studies in Computing

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

SE 4472a / ECE 9064a: Information Security

MEng, BSc Applied Computer Science

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Cryptographic mechanisms

POLITECNICO DI MILANO SCHOOL OF MANAGEMENT

Curriculum Vitae. Assistant Professor, Indian Statistical Institute, New Delhi, India since July 2010.

Lecture Notes in Computer Science

A blind digital signature scheme using elliptic curve digital signature algorithm

Lesson 4: Introduction to network security

Transcription:

Anca Nitulescu PhD Student Personal information Address: Ecole Normale Supérieure, DI Paris, France Email: anca.nitulescu@ens.fr Occupational field Cryptography: Provable Security for Protocols I have a strong background in mathematics, theoretical computer science and cryptography. My research area is focused in Theoretical Cryptography Design and Security Analysis of Cryptographic Protocols. In particular, I am interested in the following topics: { Privacy and Integrity in the Cloud { Zero-Knowledge Proof Systems { Homomorphic Authentication Primitives { Secure Multi-Party Computations { Verifiable Delegation of Computations PhD in cryptography 2015 2018 PhD Student, ENS Paris, CNRS/ERC CryptoCloud Project. Efficient Protocols for Privacy and Integrity in the Cloud David Pointcheval, Michele Abdalla Cloud computing is a paradigm in which users lease computing resources from powerful service providers. While cloud computing presents several benefits (such as reduced costs and new business opportunities), it also poses serious security concerns. Indeed, once everything is on the cloud, the surface of attack becomes larger than in the traditional local setting: cloud providers may be negligent in following security policies, they may host malicious insiders, or they may be subject to external attacks. These risks threaten the privacy and integrity of data and computations outsourced by users to the Cloud, and in fact represent an obstacle for many organizations to adopt cloud computing.

Academic Awards 2013 2014 PGSM Master Programme Paris Graduate School of Mathematical Sciences International Scholarship Program of Fondation Sciences Mathematiques de Paris Research 03/2015-09/2015 09/2014-02/2015 March-July 2014 Research Intern, IMDEA Software Institute. Madrid On the security of SNARKs in the presence of Oracles Dario Fiore Research Project, Ecole Normale Supérieure. Computer Science Department Password-Protected Secret Sharing David Pointcheval, Michele Abdalla Internship Programme, University UPMC Paris 6. Laboratory LIP6 Finding the hidden structure of a quadratic polynomial system Jean-Charles Faugere Education 2013 2014 Parisian Master of Research in Computer Science (MPRI), University Paris 7. Specialisation Cryptography, Coding, and Security s Techniques in cryptography and cryptanalysis Arithmetic algorithms for cryptology Polynomial systems, computer algebra and applications Error correcting codes and applications to cryptography Analysis of algorithms Efficient algorithms in computer algebra Mathematical foundations of automata theory Quantum information and applications 2011 2013 Master Degree in Mathematics, University of Bucharest. Faculty of Mathematics and Computer Science Specialisation Cryptography and Code Theory Degree Thesis 2 years Subexponential Factoring Algorithms Alexandru Gica

January- June 2012 s Erasmus Exchange Programme, University Claude Bernard Lyon 1. Faculty of Mathematics 1 Semester Set Theory and Model Theory Galois Theory Number Theory and Combinatorics Group Representation Theory Theory of Grobner Bases 2008 2011 Bachelor s degree in Mathematics, University of Bucharest. Faculty of Mathematics and Computer Science Specialisation Pure Mathematics Degree Thesis 3 years Elliptic Curves with Applications in Cryptography Catalin Gherghe Conferences and Workshops June 2013 Lecturers Courses June July 2012 Summer School - Number Theory for Cryptography, University of Warwick. Workshop - Number Theory, Geometry and Cryptography The Summer Courses are addressed to PhD students in number theory and closely related areas who have little knowledge of cryptography or the applications of mathematics in cryptography. Dan Bernstein, John Cremona, Andreas Enge, Tanja Lange, Francois Morain, Samir Siksek Dan Bernstein: High Speed Cryptography Andreas Enge: Complex Multiplication of Elliptic Curves Tanja Lange: Discrete Logarithms Francois Morain: Integer Factorisation Summer School Courses, Institut Fourier Grenoble. University Joseph Fourier, CNRS Foliations, Pseudoholomorphic Curves, Applications

s October 2011 s The Summer Courses in Grenoble is aimed at researchers and graduate students, its main purpose is to teach foundational material in mathematics and promote the exchange of ideas between researchers. Graduate students get vital complementary training and the opportunity to familiarise themselves with state of the art research in the chosen field. Holomorphic Foliations Hyperbolicity in Complex Manifolds Pseudoholomorphic Curves International Conference, "Romanian Cryptology Days, RCD-2011". The Foreign Intelligence Service SIE Analysis, design and evaluation of cryptographic algorithms Symmetric cryptography and cryptanalysis of block ciphers Security of cryptographic algorithms implementations Design of new hash functions (NIST SHA-3 Competition) Development and implementation of cryptographic systems Security protocols and cloud security August 2011 Summer School Courses, Scuola Matematica Interuniversitaria (SMI). University of Perugia Courses The Summer Courses in Perugia were addressed to graduate or senior students interested in research. The aim of the School is to provide young researchers with a basic training in Mathematics and its applications in various sectors, including Physics, Computer Science, Economics and Finance. In pursuit of this aim, the School organises post-graduate courses addressed to young graduate students, both from Italy and from abroad, and prepares them for attendance to Ph.D. courses, post-graduate Schools and research activities in general. Enrique Arrondo: Algebraic Geometry Vavilov Nikolay Aleksandrovich: Algebra - Lie Algebras and Representation Theory Languages Comprehension Speaking Writing Listening Reading Interaction Production Mother Tongue Romanian C2 C2 C2 C2 C2 Advanced English C1 C2 B2 B2 C1 Advanced French C1 C2 C1 B2 C1 Intermediate Spanish B2 B2 B1 B1 B2 Elementary Italian A2 A2 A1 A1 A1

Team Work Teaching Adaptability Social Organisational Computer Programming languages Skills and competences I have worked in various types of research teams for projects in my educational field I enjoy teaching mathematics. My experience in formal teaching consists of lectures, tutorials, and practicals. Private mathematical lessons and hours of tutorial support for the International students. Hours of practice in some elementary schools. I experienced different work environments in the academic programs abroad. Therefore, I am able to easily adapt to changes. I possess verbal and written communication and I am able to relate to a wide range of people. I have also a great sense of listening and negotiation. I have demonstrated leadership and organising, a firm sense of responsibility being the administrative coordinator of my class during the three years of faculty. Ability to work with several Mathematical softwares, including Maple, SAGE, Singular Familiar with C/C++, Python. Other Interests Enjoy sports particularly ski, cycling and running. Love theatre, literature, arts, cinema, music. Love to travel and experience different cultures.