No. Title Speaker Time Venue
70 Threshold Public-Key Cryptography David Pointcheval
Ecole Normale Supérieure, Paris, France
2008-10-29-2008-10-29 FIT Building 4-603, Tsinghua University
69 Efficient algorithms for the 2-gathering problem Uri Zwick
Tel Aviv University
2008-10-22-2008-10-22 FIT Building 4-603, Tsinghua University
68 Some Old and New Unsolved CS Problems Juris Hartmanis
Cornell University, USA
2007-09-20-2007-09-20 FIT Building Lecture Hall, Tsinghua University
67 Sparse High-Distance Linear Codes are Locally Testable and Correctable Madhu Sudan
MIT
2008-10-10-2008-10-10 FIT Building 4-603, Tsinghua University
66 Text-Compression using the Burrows-Wheeler Transform Elad Verbin
ITCS, Tsinghua University
2007-09-14-2007-09-14 FIT Building 4-603, Tsinghua University
65 Pairing Implementation and Its Application to Cryptography Eiji Okamoto
The University of Tsukuba
2008-10-10-2008-10-10 FIT Building 4-603, Tsinghua University
64 Secure Internet Path Quality Monitoring: Tradeoffs in Security and Efficiency David Xiao
Princeton University
2008-06-25-2008-06-25 FIT Building 4-603, Tsinghua University
63 Grand Challenges in Proof Complexity Alexander Razborov
Steklov Mathematical Institute, Russian Academy of Science, Russia
2007-09-14-2007-09-14 FIT Building 4-603, Tsinghua University
62 The Smoothed Complexity of Integer Optimization Problems Heiko Roeglin
Microsoft Research Asia
2008-06-25-2008-06-25 FIT Building 4-603, Tsinghua University
61 Nash Bargaining via Flexible Budget Markets Vijay Vazirani
Georgia Institute of Technology, USA
2008-06-20-2008-06-20 FIT Building 4-603, Tsinghua University
60 Grand Challenges in Proof Complexity Alexander Razborov
Steklov Mathematical Institute, Russian Academy of Science, Russia
2007-09-13-2007-09-13 FIT Building 4-603, Tsinghua University
59 Graph states and their applications Caterina-Eloisa Mora
University of Innsbruck
2007-06-11-2007-06-11 FIT Building 4-603, Tsinghua University
58 Efficient Algorithms for Agnostic Learning Adam Klivans
University of Texas
2008-06-12-2008-06-12 FIT Building 4-603, Tsinghua University
57 Cryptographic Hashing at the Crossroads Josef Pieprzyk
Macquarie University, Australia
2008-06-11-2008-06-11 FIT Building 4-603, Tsinghua University
56 The guessing number Taoyang Wu
Queen Mary, University of London
2007-06-11-2007-06-11 FIT Building 4-603, Tsinghua University
55 ID-based Cryptography Yi Mu
University of Wollongong, Australia
2008-06-11-2008-06-11 FIT Building 4-603, Tsinghua University
54 Optimal Bounds for Predecessor Search and the First Separation between Linear an Mikkel Thorup
University
2007-06-07-2007-06-07 AT&T Labs--Research, Shannon Laboratory
53 Double Base Number System and Elliptic Curve Cryptography Christophe Doche
Macquarie University
2008-05-28-2008-05-28 FIT Building 4-603, Tsinghua University
52 Optimal Cryptographic Hardness of Learning Monotone Functions Andrew Wan
Columbia University
2008-05-28-2008-05-28 FIT Building 4-603, Tsinghua University
51 Priority sampling to estimating arbitrary subset sums Mikkel Thorup
AT&T Labs--Research, Shannon Laboratory
2007-06-07-2007-06-07 Room 6A - 201, Tsinghua University