
The lecture titled "Public Key Cryptography: Computation, Cash and John Nash" will explain how security can be enhanced by the use of hard computational problems from Mathematics. This was the basis for the creation of publi c key cryptography in the 1970s. Public key cryptography has many applications in information security, such as secure internet shopping, digital signatures and secure automatic software updates. We will see how digital signatures have now become a crucial component of the electronic currency bitcoin. Cryptography is, of course, of great interest to national security. Recently (only declassified in 2012) it has been revealed that John Nash (subject of the film A Beautiful Mind) sent a letter to the United States National Security Agency in 1955. His letter outlined new concepts that anticipated by decades fundamental notions in computational complexity and modern cryptography.
When: 6pm (free refreshments) for 6.30pm start, Thursday 15th May, 2014
Where: Owen G Glenn Building, Room OGGB3/260-092
Note that there is public parking in the basement of the Owen G Glenn Building at 12 Grafton Road.
from The Universal Machine http://universal-machine.blogspot.com/

Put the internet to work for you.
|
Recommended for you |
Related Post:
and
- MOOC Research and Innovation
- Collection of SQL queries with Answer and Output Set 2
- PiAUISuite Update and Voicecommand v3 1
- Sign in to edx org with Google and Facebook and
- Throwing fireballs with the Kinect and Oculus Rift in Unity 3D
- IT Laws and Patents notes for BSc IT Mumbai University
- How To Bypass Megaupload Wait Time And Download At Maximum Speed !!!
- The rise of the Bots Robots Surgeons and Disruptive Technology
- The Computer Science Pipeline and Diversity Part 2 Some positive signs and looking towards the future
- Collection of SQL queries with Answer and Output Set 4
- Skill maps analytics and more with Google’s Course Builder 1 8
- Why Watson and Siri Are Not Real AI
- PPT Presentation on Memory Management in Winnows2000 and WindowsXP
- Moore’s Law Part 1 Brief history of Moores Law and current state
- Information sharing for more efficient network utilization and management
- A year and a bit with Inbox Zero
- Explore the history of Pop and Punk Jazz and Folk with the Music Timeline
- Tips on Choosing Apt Web Templates and Service Providers
- Remembering to forget
- See through the clouds with Earth Engine and Sentinel 1 Data
- Teaching machines to read between the lines and a new corpus with entity salience annotations
- The Computer Science Pipeline and Diversity Part 1 How did we get here
- Getting your fridge to order food for you with a RPi camera and a hacked up Instacart API
- Google’s Course Builder 1 9 improves instructor experience and takes Skill Maps to the next level
- Sudoku Linear Optimization and the Ten Cent Diet
0 comments:
Post a Comment