<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta http-equiv="content-type" content="text/html;
charset=ISO-8859-15">
</head>
<body text="#000000" bgcolor="#ffffff">
<span class="Apple-style-span" style="border-collapse: separate;
color: rgb(0, 0, 0); font-family: 'Times New Roman'; font-size:
16px; font-style: normal; font-variant: normal; font-weight:
normal; letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span class="Apple-style-span"
style="color: rgb(0, 53, 96);">
<div class="section"
id="improved-generic-algorithms-for-hard-knapsacks"
style="margin: 0px 16px 0px 0px; padding: 0px 0px 1.5em;
border-width: 0px; font-weight: inherit; font-style: inherit;
font-size: 12px; font-family: inherit; vertical-align:
baseline; display: inline; width: 572px; float: left;">
<h3><span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space:
normal; widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);">
</span></span></h3>
<h3><img src="cid:part1.00060605.07080609@ruhr-uni-bochum.de"
alt="HGI" height="106" width="116" align="right"><br>
</h3>
<big><big><big><small>Sehr geehrte Damen und Herren, <br>
<br>
<br>
im Rahmen des HGI-Kolloquiums organisiert vom
Lehrstuhl für Netz- und Datensicherheit (NDS), wird<br>
<br>
<big><u>Aydin Sezgin</u></big></small><u><br>
<br>
</u><small>von der <br>
<br>
Universität Ulm<br>
<br>
am <br>
<br>
kommenden <u><b>Donnerstag</b>, den 09. Juni
2011 um 12.00 Uhr s.t. in Raum ID 03/411</u></small></big></big></big><small><small><small><span
class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans:
2; text-indent: 0px; text-transform: none;
white-space: normal; widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53,
96);"><span class="Apple-style-span"
style="border-collapse: separate; color: rgb(0, 0,
0); font-family: 'Times New Roman'; font-size:
16px; font-style: normal; font-variant: normal;
font-weight: normal; letter-spacing: normal;
line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows:
2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0,
53, 96);"> (und damit <b>nicht</b></span></span></span></span></small></small></small>
<big><big>wie vorher versehentlich angekündigt am Mittwoch!)</big></big><br>
<big><big><big><small><u> <br>
</u>über folgendes Thema referieren:</small><br>
</big></big></big> <br>
<br>
<hr size="2" width="100%">
<h3>INFORMATION THEORETIC SECRECY IN BROADCAST
CHANNELS WITH RECEIVER SIDE INFORMATION</h3>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);">
<p style="margin: 0px 0px 1.5em; padding: 0px;
border-width: 0px; font-weight: inherit; font-style:
inherit; font-size: 12px; font-family: inherit;
vertical-align: baseline; text-align: justify;">The
conventional way to achieve confidentiality is
by using cryptographic encryption based on keys.
While this approach has both it advantages and
disadanvtages, the information theoretic
approach can be regarded as a powerful
alternative or as an additional level of
protection to achieve security in wireless
networks. This approach guarantees both
reliability and security, which the other
approach can not.</p>
<p style="margin: 0px 0px 1.5em; padding: 0px;
border-width: 0px; font-weight: inherit; font-style:
inherit; font-size: 12px; font-family: inherit;
vertical-align: baseline; text-align: justify;">We
utilize this approach in the study of secret
communication for broadcast channels with two
legitimate receivers and one eavesdropper. The
transmitter sends two independent confidential
messages to both legitimate receivers which have
to be kept secret from the eavesdropper. Here, each
receiver is interested in its own message having
the other confidential message already as side
information available. This problem arises for
example in the broadcast phase of a bidirectional
relaying network, where a relay node establishes a
bidirectional communication between two nodes
while keeping the communication secure from
eavesdroppers outside the network. We provide
inner and outer bounds on the secrecy capacity
region. For the inner bound, the transmitter adds
intentionally structural randomness in form of
stochastic coding, effectively jamming the
eavesdropper while guaranteeing that the
desired users get the information reliably. The
outer and inner bounds do not coincide, however they
provide some interesting insights.</p>
</span></span>
<p style="margin: 0px 0px 1.5em; padding: 0px; border-width:
0px; font-weight: inherit; font-style: inherit; font-size:
12px; font-family: inherit; vertical-align: baseline;
text-align: justify;"> </p>
</div>
</span></span><span class="Apple-style-span"
style="border-collapse: separate; color: rgb(0, 0, 0);
font-family: 'Times New Roman'; font-size: 16px; font-style:
normal; font-variant: normal; font-weight: normal; letter-spacing:
normal; line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows: 2;
word-spacing: 0px;"><span class="Apple-style-span" style="color:
rgb(0, 53, 96);">
<div class="section"
id="cover-and-decomposition-index-calculus-on-elliptic-curves-made-practical"
style="margin: 0px 16px 0px 0px; padding: 0px 0px 1.5em;
border-width: 0px; font-weight: inherit; font-style: inherit;
font-size: 12px; font-family: inherit; vertical-align:
baseline; display: inline; width: 572px; float: left;">
<hr size="2" width="100%">
<p style="margin: 0px 0px 1.5em; padding: 0px; border-width:
0px; font-weight: inherit; font-style: inherit; font-size:
12px; font-family: inherit; vertical-align: baseline;
text-align: justify;"><br>
</p>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"> </span></span><span
class="Apple-style-span" style="border-collapse: separate;
color: rgb(0, 0, 0); font-weight: normal; letter-spacing:
normal; line-height: normal; orphans: 2; text-indent: 0px;
text-transform: none; white-space: normal; widows: 2;
word-spacing: 0px;"><span class="Apple-style-span"
style="color: rgb(0, 53, 96);"><big>Der Vortrag beginnt am
Donnerstag um 12.00 Uhr s.t. im ID 03/411.<br>
</big></span></span><br>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"><big>Zu
diesem und sämtlichen weiteren Vorträgen im Rahmen des
HGI-Kolloquiums sind alle Studierenden und
Interessierten herzlich eingeladen! Eine Voranmeldung
ist nicht erforderlich!</big></span></span>
<p><span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space:
normal; widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"></span></span></p>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"><big>Weitere
Informationen gibt es auf folgender Webseite:<br>
<br>
<a
href="http://hgi.rub.de/hgi/hgi-seminar/aktuelles/">http://hgi.rub.de/hgi/hgi-seminar/aktuelles/</a></big><br>
</span></span><span class="Apple-style-span"
style="border-collapse: separate; color: rgb(0, 0, 0);
font-family: 'Times New Roman'; font-size: 16px; font-style:
normal; font-variant: normal; font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"></span></span><br>
<span class="Apple-style-span" style="border-collapse:
separate; color: rgb(0, 0, 0); font-weight: normal;
letter-spacing: normal; line-height: normal; orphans: 2;
text-indent: 0px; text-transform: none; white-space: normal;
widows: 2; word-spacing: 0px;"><span
class="Apple-style-span" style="color: rgb(0, 53, 96);"></span></span><br>
<big><big>Beste Grüße, <br>
Florian Kohlar</big></big><br>
<br>
</div>
</span></span><br>
<br>
<pre class="moz-signature" cols="72">--
Dipl.-Ing. Florian Kohlar
Lehrstuhl für Netz- und Datensicherheit
Ruhr Universität Bochum
-----------------------------------
Universitätsstr. 150, Geb. ID 2/457
D-44780 Bochum
Telefon: +49 (0) 234 / 32-26798
Fax: +49 (0) 234 / 32-14347
<a class="moz-txt-link-freetext" href="http://www.nds.rub.de">http://www.nds.rub.de</a>
</pre>
<br>
<pre class="moz-signature" cols="72">--
Dipl.-Ing. Florian Kohlar
Lehrstuhl für Netz- und Datensicherheit
Ruhr Universität Bochum
-----------------------------------
Universitätsstr. 150, Geb. ID 2/457
D-44780 Bochum
Telefon: +49 (0) 234 / 32-26798
Fax: +49 (0) 234 / 32-14347
<a class="moz-txt-link-freetext" href="http://www.nds.rub.de">http://www.nds.rub.de</a>
</pre>
</body>
</html>