<html><body bgcolor="#FFFFFF"><div><div><div><div><div><div><span class="Apple-style-span" style="-webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); font-size: 16px; font-family: 'Times New Roman'; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "><div class="section" id="improved-generic-algorithms-for-hard-knapsacks" style="margin-top: 0px; margin-right: 16px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 1.5em; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; display: inline; width: 572px; float: left; "><h3><img src="cid:part1.07020907.01010505@ruhr-uni-bochum.de" alt="HGI" height="106" width="116" align="right"><br></h3><big><big><big><small>Sehr geehrte Damen und Herren, <br><br><br>im Rahmen des HGI-Kolloquiums organisiert vom Lehrstuhl für Netz- und Datensicherheit (NDS), wird<br><br> <big><u>Aydin Sezgin</u></big></small><u><br><br></u><small>von der <br><br> Universität Ulm<br><br> am <br><br> <u>am kommenden Mittwoch um 12.00 Uhr s.t. in Raum ID 03/411<br><br></u>über folgendes Thema referieren:</small><br></big></big></big><br><br><hr size="2" width="100%"><big><b><span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Helvetica; font-weight: normal; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); font-size: medium; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); font-family: 'Times New Roman'; font-size: 14px; "><b><span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Helvetica; font-weight: normal; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); font-size: medium; "><pre style="display: inline !important; ">Information Theoretic Secrecy in Broadcast Channels with Receiver Side Information</pre></span></b></span></span></b></big></div><div class="section" id="improved-generic-algorithms-for-hard-knapsacks" style="margin-top: 0px; margin-right: 16px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 1.5em; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; display: inline; width: 572px; float: left; "><big><b><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "></span></span></b><div style="text-align: justify;"><font class="Apple-style-span" size="3"><span class="Apple-style-span" style="font-size: 13px;"><span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Helvetica; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); font-size: medium; "><pre>The conventional way to achieve confidentiality is by using
cryptographic encryption based on keys. While this approach has both it
advantages and disadanvtages, the information theoretic approach can be
regarded as a powerful alternative or as an additional level of
protection to achieve security in wireless networks. This approach
guarantees both reliability and security, which the other approach can not.
We utilize this approach in the study of secret communication for
broadcast channels with two legitimate receivers and one eavesdropper.
The transmitter sends two independent confidential messages to both
legitimate receivers which have to be kept secret from the eavesdropper.
Here, each receiver is interested in its own message having the other
confidential message already as side information available. This problem
arises for example in the broadcast phase of a bidirectional relaying
network, where a relay node establishes a bidirectional communication
between two nodes while keeping the communication secure from
eavesdroppers outside the network. We provide inner and outer bounds on
the secrecy capacity region. For the inner bound, the transmitter adds
intentionally structural randomness in form of stochastic coding,
effectively jamming the eavesdropper while guaranteeing that the desired
users get the information reliably. The outer and inner bounds do not
coincide, however they provide some interesting insights.</pre></span></span></font></div></big><br><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; text-align: justify; "></p></div></span></span><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "><div class="section" id="cover-and-decomposition-index-calculus-on-elliptic-curves-made-practical" style="margin-top: 0px; margin-right: 16px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 1.5em; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; display: inline; width: 572px; float: left; "><hr size="2" width="100%"><p style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; font-weight: inherit; font-style: inherit; font-size: 12px; font-family: inherit; vertical-align: baseline; text-align: justify; "><br></p><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "></span></span><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "><big>Der Vortrag beginnt am Mittwoch um 12.00 Uhr s.t. im ID 03/411.<br></big></span></span><br><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "><big>Zu diesem und sämtlichen weiteren Vorträgen im Rahmen des HGI-Kolloquiums sind alle Studierenden und Interessierten herzlich eingeladen! Eine Voranmeldung ist nicht erforderlich!</big></span></span><p><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "></span></span></p><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "><big>Weitere Informationen gibt es auf folgender Webseite:<br><br> <a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"></a><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"></a><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"></a><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"></a><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"></a><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"></a><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/"><a href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/">http://hgi.rub.de/hgi/hgi-seminar/aktuelles/</a></a></big><br></span></span><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size: 16px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "></span></span><br><span class="Apple-style-span" style="border-collapse: separate; color: rgb(0, 0, 0); font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; "><span class="Apple-style-span" style="color: rgb(0, 53, 96); "></span></span><br><big><big>Beste Grüße, <br>Florian Kohlar</big></big><br><br></div></span></span><br><br><br><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72"><br></pre><pre class="moz-signature" cols="72">--
Dipl.-Ing. Florian Kohlar
Lehrstuhl für Netz- und Datensicherheit
Ruhr Universität Bochum
-----------------------------------
Universitätsstr. 150, Geb. ID 2/457
D-44780 Bochum
Telefon: <a href="tel:+49%20(0)%20234%20/%2032-26798" x-apple-data-detectors="true">+49 (0) 234 / 32-26798</a>
Fax: <a href="tel:+49%20(0)%20234%20/%2032-14347" x-apple-data-detectors="true">+49 (0) 234 / 32-14347</a>
<a class="moz-txt-link-freetext" href="http://www.nds.rub.de/"></a><a href="http://www.nds.rub.de"></a><a href="http://www.nds.rub.de"></a><a href="http://www.nds.rub.de"></a><a href="http://www.nds.rub.de"></a><a href="http://www.nds.rub.de"></a><a href="http://www.nds.rub.de"><a href="http://www.nds.rub.de">http://www.nds.rub.de</a></a>
</pre><p><br></p><span></span><div></div></div><div><span></span></div></div><div><span></span></div></div><div><span></span></div></div><div><span></span></div></div><div><span></span></div></div><div><span></span></div></body></html>