You are here: Home Previous Events 2018 Algorithms for Computer Networks …

Algorithms for Computer Networks (Sommer 2018)

Seminar for master students of Computer Science and Embedding Systems discussion current and classic research in the area.


  • 13.04.2018: web page online
  • 13.04.2018: ILIAS-page online


  • 18.04.2018: 16:15 room 051-00-031 – First meeting
  • Wednesday 16:15 room 051-00-031 – Kickoff presentations, starting 30.08.2018
  • 23.07.2018 9:15-12:15 in 052-02-017
  • 24.07.2018 9:15-16:15 in 052-02-017


We discuss up-to-date topics of distributed algorithms, cryptography, coding theory, and wireless communication.

  1. Cryptography
    1. Impagliazzo, Russell, and Moti Yung. "Direct minimum-knowledge computations." Conference on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1987.
    2. I. Chatzigiannakis, A. Pyrgelis, P. G. Spirakis and Y. C. Stamatiou, "Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices," 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, 2011, pp. 715-720.
    3. Wei, Tzer-jen, and Lih-Chung Wang. "A fast mental poker protocol." Journal of Mathematical Cryptology 6.1 (2012): 39-68.
    4. Castella-Roca, Jordi, Josep Domingo-Ferrer, and Francesc Sebé. "On the security of a repaired mental poker protocol." Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on. IEEE, 2006.
  2. Localization
    1. Arun, K. Somani, Thomas S. Huang, and Steven D. Blostein. "Least-squares fitting of two 3-D point sets." IEEE Transactions on pattern analysis and machine intelligence 5 (1987): 698-700.
    2. Särkkä, Simo, Aki Vehtari, and Jouko Lampinen. "Rao-Blackwellized Monte Carlo data association for multiple target tracking." Proceedings of the seventh international conference on information fusion. Vol. 1. I, 2004.
    3. Vo, B-N., and W-K. Ma. "The Gaussian mixture probability hypothesis density filter." IEEE Transactions on signal processing 54.11 (2006): 4091-4104.
  3. Block Chain, Bitcoins etc.
    1. A. Miller, A. Juels, E. Shi, B. Parno and J. Katz, "Permacoin: Repurposing Bitcoin Work for Data Preservation," 2014 IEEE Symposium on Security and Privacy, San Jose, CA, 2014, pp. 475-490.
    2. Back, Adam, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. "Enabling blockchain innovations with pegged sidechains." URL: http://www. opensciencereview. com/papers/123/enablingblockchain-innovations-with-pegged-sidechains (2014).
    3. Decker, Christian, and Roger Wattenhofer. "Information propagation in the bitcoin network." In Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on, pp. 1-10. IEEE, 2013.
    4. Popov, Serguei. "The Tangle (2017)." URL https://iota. org/IOTA_Whitepaper. pdf.
    5. Wood, Gavin. "Ethereum: A secure decentralised generalised transaction ledger." Ethereum Project Yellow Paper 151 (2014): 1-32.
    6. Eyal, Ittay, and Emin Gün Sirer. "Majority is not enough: Bitcoin mining is vulnerable." In International conference on financial cryptography and data security, pp. 436-454. Springer, Berlin, Heidelberg, 2014.
    7. "The Miner's Dilemma," 2015 IEEE Symposium on Security and Privacy, San Jose, CA, 2015, pp. 89-103.
    8. Karame, Ghassan O., Elli Androulaki, and Srdjan Capkun. "Double-spending fast payments in bitcoin." In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 906-917. ACM, 2012.
  4. Stabilisation, Robot flocking etc.
    1. Patt-Shamir, Boaz, and Mor Perry. "Proof-labeling schemes: broadcast, unicast and in between." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 1-17. Springer, Cham, 2017.
    2. Laveau, Marie, George Manoussakis, Joffroy Beauquier, Thibault Bernard, Janna Burman, Johanne Cohen, and Laurence Pilard. "Self-stabilizing distributed stable marriage." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 46-61. Springer, Cham, 2017.
    3. Feldmann, Michael, and Christian Scheideler. "A Self-Stabilizing General De Bruijn Graph." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 250-264. Springer, Cham, 2017.
    4. Canepa, Davide, Xavier Defago, Taisuke Izumi, and Maria Potop-Butucaru. "Flocking with Oblivious Robots." In International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 94-108. Springer, Cham, 2016.
  5. Wireless Sensor Networks
    1. Ferrari, Federico, et al. "Efficient network flooding and time synchronization with glossy." Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on. IEEE, 2011.
    2. Basagni, Stefano, Chiara Petrioli, and Dora Spenza. "CTP-WUR: The collection tree protocol in wake-up radio WSNs for critical applications." Computing, Networking and Communications (ICNC), 2016 International Conference on. IEEE, 2016.
    3. Sutton, Felix, et al. "Zippy: On-demand network flooding." Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems. ACM, 2015.


For a successful participation you have to 

  1. Give a 15 minute kickoff presentation (1/6)
  2. Write a written (max) 5 page report (LaTeX) until 12.07.2018 and upload it using ILIAS (1/6)
  3. Give a 30 minute final presentation during the block seminar (1/2)
  4. Survive the 15 minute discussion after your presentation (1/6)

All presentations will be recorded and will be made accessible to the participants. 


Registration online with the University system before and after the presentation of topics. Please register also on ILIAS-page. 

First name Last name No. Title Supervisor Kickoff date Presen- tation date  ILIAS login
Samuel Steinegger  1.1. Direct minimum-knowledge computations Schindelhauer 06.06.18 23.07.18 09:15 ss315
Sebastian Aschenbrenner 1.3. A fast mental poker protocol Schindelhauer 06.06.18 23.07.18 10:00 sa146
Andrea Bucci 1.4. On the Security of the Repaired Mental Poker Protocol Schindelhauer 06.06.18 23.07.18 10:45 ab863
Paul Willi 5.1. Efficient network flooding and time synchronization with glossy  Schindelhauer  06.06.18 23.07.18 11:30


Karsten Fix 4.2. Self-stabilizing distributed stable marriage Köhler 30.05.18 24.07.18 09:15 kf117
Bithiah Yuan 3.8. Double-spending fast payments in bitcoin Ortolf 30.05.18 24.07.18 10:00 by19
Ravi Shankar Chintalapati 3.7. The Miner's Dilemma Schillinger 30.05.18  24.07.18 10:45 vc35
Sharmeela Ashwin 3.3. Information propagation in the bitcoin network Schillinger 30.05.18

24.07.18 11:15

Anna Windbühler 3.4. The Tangle Schillinger 30.05.18 24.07.18 13:05 aw281
Tobias Demmler 3.5. Ethereum: A secure decentralised generalised transaction ledger Ortolf 30.05.18 24.07.18 13:50 td87




  • Registration and kickoff presentations, Wednesday, 16-18, 051-00-031
  • Kickoff presentations 30.05.2018, 06.06.2018
  • Block seminar 23.07./24.07.2018 in 052-02-017