"> TCS / Studies / T-79.514 Special Course on Cryptology

Schedule

Missing presenter/opponent names means that the corresponding position is still open. (In such cases, the concrete topic might be relocated to a different date.) Missing topic names means that the course has not yet been planned to this far in such a level of details. In preparing your own survey, please use Petteri's .tex file as a formatting example. (See here for the outcomes of T79-511 in 2001.) Please also use the slide templates: template.tex and init.tex. Process your slides, if possible, by pdflatex, and return them in a .pdf format. The survey could be returned in .ps, .pdf or both.

Preliminary (tentative! The order might be rescheduled, topics changed, etc) schedule follows. Details can be changed, so be uptodate!

Holes in the schedule: most probably, the seminars on 15.10 and 26.11 will be cancelled. It will be announced in advance. To compensate it, we will have 2 seminars on some of the Wednesdays.
DateSubject(sl)ides, (su)rveysPresenterOpponentSuggested reading
10.09.2003Course introduction. Giving the assignments
General introslHelger Lipmaa--
17.09.2003Cryptography for data-miners: what is possible and what is not slHelger Lipmaa-May be Multi party computations: past and present (Shafi Goldwasser, ACM PODC 1997)
DM for cryptographers slElla Bingham- From Data Mining to Knowledge Discovery in > Databases" by Usama Fayyad, Gregory Piatetsky-Shapiro, and > Padhraic Smyth. AI Magazine 17(3): Fall 1996, 37-54.
24.09.2003Cryptographic Techniques for Privacy-Preserving Data Mining su sl re (corrected, added 07.12.03) Alexey Vyskubov Johan WallénCryptographic Techniques for Privacy-Preserving Data Mining (Benny Pinkas, Newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining, January 2003), Privacy Preserving Data Mining (Yehuda Lindell and Benny Pinkas, Crypto 2000) OK
01.10.2003Intro to PPDMsu sl re (corrected, 15.01.04) Xavier Rondé-OustauTatiana Issaeva Privacy-Preserving Data Mining (Rakesh Agrawal, Ramakrishnan Srikant, SIGMOD 2000)
08.10.2003Database randomization via RRTsu sl re (corrected survey: 29.11.03)Isto NiemiEmilia OikarinenPrivacy Preserving Mining of Association Rules (Evfimievski, R. Srikant, R. Agrawal and J. Gehrke, KDD 2002), Using Randomized Response Techniques for Privacy-Preserving Data Mining (Wenliang Du and Zhijun Zhan, SIGKDD 2003)OK
15.10.2003Cancelled
22.10.2003Cryptographic RRTsu sl (corrected, posted 29.10.03)Ella Bingham(Helger Lipmaa)Cryptographic Randomized Response Techniques (Andris Ambainis, Markus Jakobsson and Helger Lipmaa, eprint 2003/027)
Frequent Pattern Mining (survey)Bart Goethals-Survey on Frequent Pattern Mining (Bart Goethals, 2003)
29.10.2003Reconstruction of databases su sl re (corrected, posted 04.11.03) Emilia OikarinenIsto NiemiRevealing information while preserving privacy (Irit Dinur, Kobbi Nissim, SIGMOD 2003)OK
05.11.2003Private Information Retrieval su sl re (corrected survey: 21.11.03)Vesa VaskelainenXavier Rondé-OustauLinks (Protecting Data Privacy in Private Information Retrieval Schemes, Quantum Symmetrically-Private Information Retrieval)OK
Privacy-Preserving K-Means Clustering over Vertically Partitioned Data su sl re (corrected, 07.12.03)Tatiana IssaevaMatti JärvisaloPrivacy-Preserving K-Means Clustering over Vertically Partitioned Data (Jaideep Vaidya, Chris Clifton)Pending
12.11.2003Private function evaluation su sl re (corrected survey: 24.11.03)Johan WallénAlexey VyskubovSelective Private Function Evaluation with Applications to Private Statistics (Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright, 2001)OK
On inverse frequent set miningTaneli J. Mielikäinen -On inverse frequent set mining (Taneli J. Mielikäinen, 2nd Workshop on Privacy Preserving Data Mining)
19.11.2003Secure Approximate Matching su sl re (corrected, 07.11.03)Matti JärvisaloSami VaaralaProtocols For Secure Remote database Access With Approximate Matching (Wenliang Du, Mikhail J. Atallah, ACM SPE 2000)OK
Cryptanalysis of SAM su sl re
(corrected, 09.01.04)
Sami VaaralaVesa VaskelainenVulnerabilities in Similarity Search Based Systems (Ali Saman Tosun, Hakan Ferhatosmanoglu, CIKM 2002)OK
26.11.2003Most probably cancelled

The choice of the topics is not final. If you have a topic yourself, please let me know.