Miroslaw Kutylowski
- Professor of Computer Science at Wroclaw University of Technology
Seminars
Current courses
Office hours
Next term
Previous terms
External courses
Teaching materials
Seminar Cryptography and Computer Security
Miroslaw Kutylowski
Instytut Matematyki i Informatyki
,
Wydzial Podstawowych Problemow Techniki
,
Politechnika Wroclawska
Schedule:
Monday
, 11:15-13:00, room 215, D1
Link to summer 2001
,
Link to academic year 2001/2002
,
Link to years 2002-2005
,
Link to years 2005-2006
,
Link to years 2006-2007
Link to years 2007-2010
Topics
Starting from January 2015 the informatiuon will be available via the
department webpage
26.1.2015, Domain signatures, K.Kluczniak
19.1.2015, Blind signatures, L.Hanzlik
12.1.2015, Blind signtures, L.Hanzlik
5.1.2015, PRNG, M.Kutylowski
...
...
3.11.2014, e-voting, F.Zagorski
27.10.2014, L.Hanzlik
20.10.2014, K.Kluczniak
13.10.2014, current ideas form dissertation, K.Kluczniak
13.10.2014, Pallier cryptosystem, K.Kluczniak
6.10.2014, A new signature revocation model, M.Kutylowski
19.05.2014, key evolution issues, M.Kutylowski
12.05, new attacks, P.Kubiak
... (many entries missing)
7.4.2014, L.Krzywiecki
31.3.2014, Institute meeting
24.3.2014, internal project seminar
17.3.2014, Covert communication
10.3.2014, Creating a shadow service, P.Kubiak
3.3.2014, RFID open problems, M.Kutylowski
24.2.2014, attacks on signatures, L.Hanzlik
14.1.2014, on paper: Distributed Shuffling for Preserving Access Confidentiality, W.Macyna
13.1.2014, whole day project workshop
7.1.2014, project meeting
16.12.2013, pseudorandom generators, M.Kutylowski
9.12.2013, hardware Trojans, W.Wodo
2.12.2013, designated verifier electronic signature systems, L.Krzywiecki, cnt
26.11.2013, designated verifier electronic signature systems, L.Krzywiecki
19.11.2013, problems
12.11.2013, News from ICT 2013, M.Kutylowski
4.11.2013, News on OPACITY, W.Wodo
28.10.2013, Stack-Schnorr proof protocol for securing data flow, P.Kubiak
21.10.2013, Hardware protectioin of biometrics, W.Wodo
14.10.2013, Vehicles, PKIi ... , L.Krzywiecki
7.10.2013, new results, L.Hanzlik
30.09.2013, Kick-off meeting
20.03.2013, Alternative approach for security of AKE, M.Kutylowski
13.05.2013, conference
6.05.2013, Canetti-Krawczyk model, L.Hanzlik
29.04.2013, problems, M.Kutylowski
22.04.2013, ID Mixer, K.Kluczniak
15.04,2013, pairing based RI, L.Hanzlik
25.03.2013, RI, K.Kluczniak, L.Hanzlik
18.02.2013, AMA
11.02.2013, PhD defense ...
28.01.2013, Chari, L.Hanzlik
21.01.2013, Models for security of authentication, K.Kluczniak, L.Hanzlik
14.01.2013, Private authentication, M.Kutylowski
7.01.2013, Private authentication, L.Krzywiecki
17.12.12, new Terminal Authentication, L.Krzywiecki and co.
10.12.12, news, M.Kutylowski
19.11.12, u-prove
12.11.12, chari-z, L.Hanzlik
05.11.12, White lists, P.Kubiak
29.10.12, fault attack ideas, M.Kutylowski
22.10.12, Immunity of signatures when ephemeral keys leaked, L.Krzywiecki
15.10.12, Active authentication, L.Hanzlik
8.10.12, LPN and symmetric encryption, K.Majcher
1.10.12, Chari-Z, a new solution, L.Hanzlik
24.9.12, Chari-Z, K.Kluczniak, Print your passport, M.Kutylowski
...
5.03.12, Signing and encryption with the same key, K.Majcher
27.02.12, Signing and encryption with the same key, K.Majcher
27.02.12, Linking attacks on a verison of CHA, L.Hanzlik,
20.02.12, Leftover Lemma , W.Wodo
13-14.02.12, workshop on RI and AA
13.02.12, Sector signatures
6.02.12, Problems for encryption with LPN, M.Kutylowski
16.01.12,formal proof for AA, L.Krzywiecki
9.01.12, MISTRZ meeting
2.01.12, Active authentication, continued
19.12.11, ``Co2tonie1'', M.Kutylowski, report on current issues on Active Authentication, L.Krzywiecki
12.12.11, Active authentication, L.Krzywiecki, L.Hanzlik
28.11.2011, P.Syga
21.11.2011, sensors project meeting
14.11.11, Hierarchical signatures, L.Krzywiecki
7.11.11, LPN and epsilons, M.Kutylowski
24.10.11, Security proofs for mediated RFID authentication, P.Syga
17.10.11, Proof of possesion from a cloud, L.Krzywiecki
10.10.11, RFID authentication and LPN, P.Syga
3.10.11, How to print a secret, Alex Essex
26.09.11, problem session, M.Kutylowski
6.06.11, PKI with Schnorr, ending at 11:15
30.05.11, workshop in Bonn, no seminar
23.05.11,
16.05.11, Schnorr signatures, P.Kubiak
9.05.11, internal discussion
18.04.11, Anonymous credentials, L. Hanzlik
11.04.11, new ideas, L.Krzywiecki, seminar will be only 1 hour
4.04.11, two-head-dragon continued
28.03.11, two-head dragon
21.03.11, some new results, L.Krzywiecki
14.03.11, short seminar, current problems on personal ID
7.03.11, Restricted identification, P.Syga
28.02.11, a revocation scheme, M.Kutylowski
7.02.11, broadcast encryption, L.Krzywiecki, M.Kutylowski
31.01.11, current problems
24.01.11, current problems
17.01.11, discussion about RI, L.Hanzlik
10.01.11, new proof for a protocol protocol proposed in December, L.Krzywiecki
3.01.11, commitments to polynomials, L.Krzywiecki
20.12.10, News from Asiacrypt, L.Krzywiecki, and continuation from 13.12
13.12.10, Two-head Dragon, discussion
6.12.10, continued from 29.11.10 + some ideas for weak devices
29.11.10, anonymity issues and key predistribution, M.Kutylowski
23.11.10, we are at PERADA workshop
15.11.10, at about 11:45, Security issues for an RFID system, K.Majcher
8.11.10, Key management, T.Struminski
18.10.10, HB and similar topics, K.Majcher
12.10.10, CDS - formal proofs (10-11), M.Kutylowski, A.Lauks
11.10.10, meeting in Warsaw
4.10.10, RFID tricks for VISA inspection, M.Kutylowski