Seminar Distributed Algorithms, Network Algorithms and Cryptography (Summer 2025)
News
- 24.04.2025, 10am-12pm, room 101-01-016/018 First meeting: presentation of the topics, organization
Dates
- 1st meeting, 24.04.2024, 10-12 (room 101-01-016/18), presentation of the topics, organization
- 24.04.2025 - 28.04.2025: submit 3 topics of your choice to the forum of ILIAS
- 14.07.2025: Deadline for report
- 28.07.2025: 9-17, block seminar day 1 (051-00-006)
-
29.07.2025: 9-17, block seminar day 2 (051-00-006)
Contents
We discuss up-to-date topics of distributed algorithms, cryptography, localization and wireless communication. More topics appear here soon (see also ILIAS for the papers).
- Localization
- Tabaghi, P. and Dokmanić, I., 2020. Hyperbolic distance matrices. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 1728-1738). (CS)
-
Kreković, Miranda, Ivan Dokmanić, and Martin Vetterli. "Shapes from echoes: uniqueness from point-to-plane distance matrices." IEEE Transactions on Signal Processing 68 (2020): 2480-2498. (JB)
- Y. Zhang and K. C. Ho, “Localization by signals of opportunity in the absence of transmitter position,” IEEE Trans. Signal Process., vol. 70, pp. 4602–4617, 2022. (WX)
- K. Panwar and P. Babu, “Multistatic target localization in the absence of transmitter position using differential time delay measurements,” IEEE Trans. Radar Syst., vol. 2, pp. 41–46, 2024. (WX)
-
Le, T. K., & Ho, K. C. (2020). Joint source and sensor localization by angles of arrival. IEEE Transactions on Signal Processing, 68, 6521-6534. (JB)
-
Weiss, A., Arikan, T., Vishnu, H., Deane, G. B., Singer, A. C., & Wornell, G. W. (2022). A semi-blind method for localization of underwater acoustic sources. IEEE Transactions on Signal Processing, 70, 3090-3106. (JB)
-
Sturm, C., Sorgel, W., Kayser, T. and Wiesbeck, W., 2006, June. Deterministic UWB wave propagation modeling for localization applications based on 3D ray tracing. In 2006 IEEE MTT-S International Microwave Symposium Digest (pp. 2003-2006). IEEE. (SM)
-
Del Corte-Valiente, A., Gómez-Pulido, J.M., Gutiérrez-Blanco, O. and Castillo-Sequera, J.L., 2019. Localization approach based on ray-tracing simulations and fingerprinting techniques for indoor–outdoor scenarios. Energies, 12(15), p.2943. (SM)
-
Clayirci, E. and Akyildiz, I.F., 2002. User mobility pattern scheme for location update and paging in wireless systems. IEEE Transactions on Mobile Computing, 1(3), pp.236-247.
- Cryptography
-
Shafi Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum. Delegating computation: in-
teractive proofs for muggles. In Proceedings of the 40th Annual ACM Symposium on Theory
of Computing, STOC ’08, pages 113–122, New York, NY, USA, 2008. ACM. (CS) -
Jens Groth. On the size of pairing-based non-interactive arguments. In Annual interna-
tional conference on the theory and applications of cryptographic techniques, pages 305–326.
Springer, 2016 (CS) -
Golle, P. Dealing Cards in Poker Games. In Proceedings of the International Conference on Information Technology: Coding and Computing, (2005) (CS)
-
Jonathan Lee. Dory: Efficient, transparent arguments for generalised inner products and
polynomial commitments. In Theory of Cryptography Conference, pages 1–34. Springer,
2021. (CS) - Kang, Y., Zhang, L., Ye, H., Liu, B., Pu, S., Zhang, D. and Zhuang, S., 2023. Visual cryptography based on ghost imaging and Hadamard transform. Quantum Information Processing, 22(2), p.116.
- Attema, T. and Cramer, R., 2020, August. Compressed-Sigma-protocol theory and practical application to plug & play secure algorithmics. In Annual International Cryptology Conference (pp. 513-543). Cham: Springer International Publishing.
- Dodis, Y., Halevi, S. and Rabin, T., 2000. A cryptographic solution to a game theoretic problem. In Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings 20 (pp. 112-130). Springer Berlin Heidelberg.
- Jeong, U., Ng, L. H. X., Carley, K. M., & Liu, H. (2025). Navigating decentralized online social networks: An overview of technical and societal challenges in architectural choices. arXiv:2504.00071
- Ono, H., Manabe, Y. (2019). Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations. In: Zincir-Heywood, N., Bonfante, G., Debbabi, M., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2018. Lecture Notes in Computer Science(), vol 11358. Springer, Cham.
- Bella, R., Bultel, X., Chevalier, C., Lafourcade, P., Olivier-Anclin, C. (2024). Practical Construction for Secure Trick-Taking Games Even with Cards Set Aside. In: Baldimtsi, F., Cachin, C. (eds) Financial Cryptography and Data Security. FC 2023. Lecture Notes in Computer Science, vol 13950. Springer, Cham.
-
- MIMO and Near-Field
- Chuah, C.N., Tse, D.N.C., Kahn, J.M. and Valenzuela, R.A., 2002. Capacity scaling in MIMO wireless systems under correlated fading. IEEE Transactions on Information theory, 48(3), pp.637-650. (CS)
- McKay, M.R., Collings, I.B. and Tulino, A.M., 2009. Achievable sum rate of MIMO MMSE receivers: A general analytic framework. IEEE Transactions on Information Theory, 56(1), pp.396-410. (CS)
- Peer-to-Peer Networks
-
Lau, L. C., Tung, K. C., Wang, R.: Cheeger Inequalities for Directed Graphs and Hypergraphs using Reweighted Eigenvalues. In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing (STOC 2023), pp. 1834–1847. Association for Computing Machinery, New York, NY, USA (2023). https://doi.org/10.1145/3564246.3585139 (SN)
-
Dinitz, Y., Dolev, S. & Kumar, M. Local Deal-Agreement Algorithms for Load Balancing in Dynamic General Graphs. Theory Comput Syst 67, 348–382 (2023). https://doi.org/10.1007/s00224-022-10097-6 (SN)
-
P. Kaswan, P. Mitra, A. Srivastava and S. Ulukus, "Age of Information in Gossip Networks: A Friendly Introduction and Literature Survey Invited Paper," in IEEE Transactions on Communications, doi: 10.1109/TCOMM.2024.3522043. (SN)
-
Jacek Cichoń, Dawid Dworzański, and Karol Gotfryd. On Reliability of the Extrema Propagation Technique in Random Environment. In 28th International Conference on Principles of Distributed Systems (OPODIS 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 324, pp. 29:1-29:16, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024) (SN)
- Lamport, L., Shostak, R. and Pease, M., 2019. The Byzantine generals problem. In Concurrency: the works of leslie lamport (pp. 203-226). (CS)
-
- Internet & Misc
- Kol, M., Klein, A. and Gilad, Y., 2023. Device Tracking via {Linux’s} New {TCP} Source Port Selection Algorithm. In 32nd USENIX Security Symposium (USENIX Security 23) (pp. 6167-6183).
- Bocovich, C., Breault, A., Fifield, D., Serene, & Wang, X. (2024). Snowflake, a censorship circumvention system using temporary WebRTC proxies. 33rd USENIX Security Symposium (USENIX Security 24), 2635–2652.
- Ford, B., Srisuresh, P. and Kegel, D., 2005, April. Peer-to-peer communication across network address translators. In USENIX Annual Technical Conference, General Track (pp. 179-192).
Supervisors
- CS: Christian Schindelhauer (schindel at tf dot uni dash freiburg dot de)
- JB: Joan Bordoy (bordoy at informatik dot uni dash freiburg dot de)
- WX: Wenxin Xiong (w.x.xiong at outlook dot com)
- SM: Sneha Mohanty (mohanty at informatik dot uni dash freiburg dot de)
- SN: Saptadi Nugroho (saptadinugroho at gmail dot com)
Schedule and Assinged Topics
No. | ILIAS-Kürzel | First name | Last name | Topic | Topic | Presentation date |
---|---|---|---|---|---|---|
1 | ja274 | Jonathan | Altherr | 25 | Visual Crypto Ghost | tba |
2 | ca189 | Christian | Armbruster | 26 | Compressed Σ Protocol | tba |
3 | aa423 | Andrea | Asturiano Vera | 27 | Crypto Game Theory | tba |
4 | uh37 | Ümeyir | Hallac | 18 | Ray tracing | tba |
5 | ak1314 | Alexander | Keller | 23 | Poker | tba |
6 | jm622 | Jürgen | Mattheis | 51 | Devices Tracking Linux | tba |
7 | am764 | Angelina | Miller | 43 | Age | tba |
8 | jm618 | Jan Krister | Möller | 45 | Byzantine | tba |
9 | jn167 | Jule | Nogaj | 28 | Navig Decentr Online Social Net | tba |
10 | co112 | Can Ekim | Özlü | 23 | Poker | tba |
11 | lr483 | Leo | Riegel | 15 | Angles | tba |
12 | br124 | Benjamin | Robens | 29 | Card Based Crypto Protocols | tba |
13 | bs446 | Benjamin | Schliebitz | 53 | P2P NAT | tba |
14 | ls1314 | Lukas | Seyfried | 45 | Byzantine | tba |
15 | fv91 | Felix | Vierthaler | 52 | Snowflake | tba |
16 | jz158 | John | Zeeh | 45 | Byzantine | tba |
17 | th357 | Till | Hoffmann | 210 | Secure Trick Taking | tba |
18 | at402 | Ahmet | Tümis | 29 | User mobility pattern scheme | tba |
Deliverables
For a successful participation you have to
Presentations may be recorded and published on ILIAS. Active attendance to 12 presentations (including your own) is mandatory.