ὅδε οἶκος, ὦ ἑταῖρε, μνημεῖον ἐστιν ζωῶν τῶν σοφῶν ἀνδρῶν, καὶ τῶν ἔργων αὐτῶν

Seminar for
DECISION MAKING – THEORY, TECHNOLOGY AND PRACTICE

 

PROGRAM


Plan rada Seminara Odlučivanje - teorija, tehnologija, praksa za OKTOBAR 2021.




ČETVRTAK, 07.10.2021. u 13:00, Live stream Niš
Milan Todorović, Matematički Institut SANU
COMBINATORIAL OPTIMIZATION FOR SELF CONTAINED BLOCKCHAIN: AN EXAMPLE OF USEFUL SYNERGY
With the increasing number of applications and systems that use Blockchain it is important to deal with its downsides. We are considering combinatorial optimization ideas to motivate and address two main issues in maintaining Blockhain. The first issue refers to economic usage of resources, and we propose a new consensus protocol exploring the Proof-of-Useful-Work concept. Deanonymization problem is considered as a second issue. It reduces to community detection in directed graphs which we propose to be consensus protocol’s useful work. In order to implement the proposed ideas we provide a short targeted literature review and identify the steps that need to be performed within the implementation.
This is joint work with Dušan Ramljak, Tatjana Davidović, Dragan Urošević, Tatjana Jakšić Krüger, Luka Matijević and Đorđe Jovanović.
Zajednički sastanak sa Seminarom za računarstvo i primenjenu matematiku



UTORAK, 12.10.2021. u 14:15, Live stream Niš
Milica Knežević i Siniša Tomović, Matematički Institut SANU
MAN-IN-THE-MIDDLE ATTACK AGAINST LPN-BASED AUTHENTICATION PROTOCOLS: RE-EVALUATION AND CORRECTION
Authentication is one of the key cryptology problems and it constitutes the basis of protection needed for secure communication within computer networks. RFID (Radio Frequency IDentification) is a technology applied in various fields, such as supply chain management, payment and transportation systems, access control, animal identification, etc. The necessity to provide some level of security and privacy in RFID systems, on one hand, and inherent constraints of the RFID devices, on the other, have made RFID authentication a very active and challenging research topic. As a solution, a number of lightweight authentication protocols have been proposed, and one of the significant families of protocols among these is the HB-family, whose security is based on the hardness of the LPN (Learning Parity with Noise) problem. In the focus of our research is a well-known Man-in-the-middle attack against the HB\# and Random-HB\# protocols, two prominent members of the HB-family. We show that the attack does not achieve the claimed precision and complexity, and further identify the root cause of the detected problem, which lies in reasoning based on improper approximations of the probability distributions of the central attack events. After establishing the exact distributions of these events, we rectify the attack and prove correctness of the proposed solution.
Zajednički sastanak sa Seminarom za računarstvo i primenjenu matematiku


Predavanja su namenjena sirokom krugu slusalaca, ukljucujuci studente redovnih i doktorskih studija. Seminar će se održavati svakog drugog četvrtka od 13:00 - 14:00h, CIITLAB, Elektronski fakultet Niš, Aleksandra Medvedeva 14, Niš

dr Lazar Velimirović
Rukovodilac seminara
dr Petar Vranić
Sekretar seminara