The next will be discussed during the first seminar. The seminar series will not have a concrete focus. Instead, various supervisors propose their topics for interested students. The supervisors mainly choose topics that are interesting for themselves, which in particular means that they are in most cases able to continue supervision also after the seminar to the end of a potential MSc (or BSc/PhD?) thesis. Such continuation is however not mandatory.
Students can also propose their own topics, but in this case they have to find a supervisor who is interested in supervision.
Some topics require previous knowledge of cryptography, but other topics will be accessible to students who take Crypto I in parallel (although, some independent work is to be expected in this case).
This course is obligatory for our NordSecMob master students. Everybody else is also more than welcome.
Fastest way: use OIS. If you do not manage - don't blame me, OIS was not programmed for human usage. (You probably have to email Ülle Holm who will then manually register you.)
For most of the topics, browse the corresponding section of Helger's Cryptopointers to find links to papers, surveys etc.
List of the supervisors follows. Click on the name of the supervisor for topics proposed by the concrete supervisor.
I am able to supervise up to 3 students. It is highly recommended though not necessary that students continue on those topics to finish a MSc/PhD thesis.
Goal: study my recent eprint (I'll rewrite it in the near future), and try to improve on it. Requires: good mathematical background, ability to learn some key concepts of cryptography and theoretical computer science; MSC almost a must.
Goal: study some existing PPDM methods (primarily cryptographic techniques). Requires: good mathematical background, ability to learn some key concepts of cryptography and data mining.
See seminar in Finland (2003) with a lot of links. Helger's cryptopointers on PPDM.
Goal: Survey some of the secure systems; show what kind of security is possible or impossible to achieve. Show that the Estonian e-voting systems are not secure even in the sense of possible goals. Requires: good understanding of real-world security issues, ability to learn some key concepts of cryptography.
Some links: http://www.vvk.ee/elektr/, http://www.valimised.ee/
Goal: Survey some recent works on this area. Requires: good mathematical background, ability to learn some key concepts of cryptography.
Goal: study on of the candidate hash functions. Write a survey that describes the function, security claims, etc. Discuss any known cryptanalysis. Possibility for independent work - try to break it.
Want to know something about subject? Browse the link collection at http://research.cyber.ee/~lipmaa/crypto/.
Previous years: [Autumn 2001 @TKK] [Autumn 2002 @TKK] [Autumn 2003 @TKK] [Autumn 2004 @TKK] [Autumn 2005 @Tartu] [Autumn 2008 @Tartu]
This page: http://research.cyber.ee/~lipmaa/teaching/MTAT.07.006/