Forschungsseminar

Nächste Termine

DatumUhrzeitRednerThema 
04.10.202311:00 - 12:00 CESTMax EiseleTBADetails

Vergangene Sitzungen

DatumUhrzeitRednerThema 
14.09.202310:00 - 10:45 CESTCarmela TroncosoWhen decentralization, security, and privacy are not friendsDetails
14.09.202309:15 - 10:00 CESTGilles BartheAn introduction to Differential PrivacyDetails
08.09.202312:45 - 14:00 CESTDiego AranhaFaster constant-time evaluation of the Kronecker symbolDetails
01.08.202316:00 - 17:00 CESTEstuardo Alpirez Bock / Łukasz ChmielewskiBreaking DPA-protected Kyber via the pair-pointwise multiplicationDetails
27.04.202310:00 - 11:00 CESTJulius HermelinkDecryption Errors and Implementation Attacks on KyberDetails
04.04.202316:00 - 17:00 CESTJan Richter-BrockmannComputer-Aided Verification of Countermeasures against Physical AttacksDetails
03.02.202312:30-13:30 CETSinan YavuzPhysical Unclonable Functions: An Introduction to Hardware-based Security PrimitiveDetails
30.01.202314:00-15:00 CETDavid FroelicherPrivacy-Preserving Federated Analytics with Multiparty Homomorphic EncryptionDetails
25.10.202211:00-12:00 CESTDavid BasinBreaking and Fixing Modern Payment Protocols with TamarinDetails
19.10.202216:00-17:00 CESTBerk SunarSignature Correction Attacks on Post-quantum SchemesDetails
23.09.202212:00-13:00 CESTDebajyoti DasOrgAn: Organizational Anonymity with Low LatencyDetails
16.08.202217:00-18:00 CESTMelissa AzouaouiPost-Quantum Authenticated Encryption Against Chosen-Ciphertext Side-Channel Attacks Avoiding the FO-calypseDetails
29.07.202213:00 - 14:00 CESTBenjamin BichselDP-Sniper: Black-Box Discovery of Differential Privacy Violations using ClassifiersDetails
22.06.202211:00 - 12:00 CESTChitchanok ChuengsatiansupSpectre Declassified: Reading from the Right Place at the Wrong TimeDetails
21.06.202216:00 - 17:00 CESTZhiyuan ZhangBreaking and Fixing Speculative Load HardeningDetails
03.05.202216:00 - 17:00 CESTDennis GnadOn-Chip Physical Attack Threats to FPGAs and beyondDetails
01.02.202216:00 - 17:00 CETTheresa StadlerSynthetic Data -- Anonymisation Groundhog DayDetails
11.01.202216:00 - 17:00 CETAria ShahverdiDatabase Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLiteDetails
16.12.202115:00 - 15:45 CETAniket KateRipple NetworkDetails
21.09.202116:00 - 17:00 CESTNicholas CarliniExtracting Training Data from Large Language ModelsDetails
20.07.202116:00 - 17:00 CESTAniket KateDesigning and Analyzing Network Anonymity SolutionsDetails
20.07.202115:00 - 16:00 CESTFarzad ZafaraniDifferentially Private Naïve Bayes Classifier Using Smooth SensitivityDetails
25.05.202116:00 - 17:00 CESTGhada DessoukySide-Channel-Resilient Caches for Trusted Execution EnvironmentsDetails
27.04.202115:00 - 16:00 CESTGorka Irazoqui ApececheaUpcoming trends in decentralized protocolsDetails
17.03.202109:00 -
10:00 CET
Takao MurakamiLocally Differentially Private Analysis of Graph StatisticsDetails
16.02.202116:00 -
17:00 CET
Shahin TajikReal-World Snapshots vs. Theory: Questioning the t-Probing Security ModelDetails

To top