IAMINSTITUTE OF APPLIED MATHEMATICS

Secret Sharing Schemes

Emircan Çelik

Institute of Applied Mathematics

Place: IAM S209

Date/Time: 13.12.2016 -14.30

Abstract: Although secret informations can be stored or kept secret using cryptographic systems with secret key(s), some secrets are too dangerous or too valuable that this particular key(s) to be trusted with only one person. This secrets could be a combination to a banks vault, launching password or command to a missile system, etc. This talk is mainly about sharing a secret among the certain number of participants such a way that, recovering the secret is very hard if needed conditions are not satisfied. I’ll explain the problems faced during the development of these systems. In summarizing the talk I’ll explain the ideas to develop such systems from other disciplines. .

Assessment of Forex Market Risk

Berat Tekcan

Institute of Applied Mathematics

Place: IAM S209

Date/Time: 06.12.2016 -14.30

Abstract: Forex market is a world biggest trading market where buying and selling of currencies take place. By the BIS(Bank for International Settlement) report, traded volume per day is 5.3 trillion dollars, which is an extremely high amount as compared to the other trade markets like Stocks and Futures. After introducing this subject, I will continue my talk on the history and advantages of trading forex and how can we manage the risk. At the end, if the time permits, we shall consider the relation between taking the risk and getting the good rewards. Keywords: Leverage, Liquidity, Risk per Trade.

Cryptography For Secure Payment Card Transaction

Erkan Uslu

Institute of Applied Mathematics

Place: IAM S209

Date/Time: 29.11.2016 -14.30

Abstract: Financial sector organisations such as VISA, Master Card etc. are among the most important users of cryptography. These companies widely use certain cryptograpic algorithms in order to prevent financial fraud. During my speech, I will explain that how the international payment card organisations provide the security of financial transactions from cryptographic aspect.

On the Mortgage Loans and 2008 Financial Crisis

Eren Ertürk

Institute of Applied Mathematics

Place: IAM S209

Date/Time: 29.11.2016 -14.30

Abstract: 2008 Financial Crisis have been considered by many economists as the worst financial crisis since the Great Depression of the 1930’s. In USA, nearly 8 million people lost their jobs and 6 million lost their homes because of the economic crisis. In this talk, I will first talk about U.S. housing market and mortgage loans. After introducing the necessary terminology of this subject, I will continue my talk on the main causes of the financial crisis throughout 1970 to 2008. At the end, if the time permits, we shall consider the consequences of the global crisis.

Efficient Exponentiation Algorithms

H. Bartu Yünüak

Institute of Applied Mathematics

Place: IAM S209

Date/Time: 22.11.2016 -14.30

Abstract: The importance of discrete logarithm problem in cryptography brings up the issue of finding effi- cient algorithms for integer exponentiation. The aim of this presentation is to give an idea about the current exponentiation-by-squaring methods, and the recent iterative squaring and cubing algorithms. At the end, I will talk about how these techniques will be utilized in our research on fast cubing algorithms.

Finite linear representations of nonlinear dynamical systems

Mehmet Can Savaş

Institute of Applied Mathematics

Place: IAM S209

Date/Time: 22.11.2016 -14.30

Abstract:Nonlinear dynamical systems are of interest to scientists from various different areas because most systems are inherently nonlinear in nature. Problems involving nonlinear dynamical systems are vast and methods of analyzing, oftentimes problem dependent. In this speech, I talk about a special technique involves Koopman operator and how to use it to analyze nonlinear dynamical systems. Moreover, in some cases, we see that nonlinear dynamical systems can actually be simulated using a higher dimensional linear dynamical system.

Risk Management Aspects In Real Estate

Ayca Bayram

Institute of Applied Mathematics

Date/Time: 15.11.2016 -14.30

Abstract: Effective risk management strategies allow you to identify your project’s strengths, weaknesses, opportunities and threats. By planning for unexpected events, you can be ready to respond if they arise. To ensure your project’s success, define how you will handle potential risks so you can identify, mitigate or avoid problems when you need to do. To comprehend risk management process in real estate, at the start of presentation, I will give some definitions and terminologies about real estate and we will talk about risk in real estate market. Then, talk will ontinue with risk in real estate markets and finally I will  briefly express risk management process.

Radio frequency identification (RFID) and Internet of Things (IoT)

Buse Taşçı

Institute of Applied Mathematics

Date/Time: 15.11.2016 -14.30

Abstract: Technological devices together with the usage of internet became a big and irreplaceable part of our lives. This situation brings a new concept, called Internet of Things(IoT) that indicates a communication of smart and connected objects via a network without a requirement of intervention. One of the most important community for providing this communication over an IoT is Radio Frequency Identification(RFID) technology. It uses an electromagnetic system in order to determine and follow a special tag by superimposing on a device. Also, in order to provide privacy and security requirements of RFID users, lots of security schemes have been proposed which have tried to provide secure and untraceable communication for end-users.

Elliptic Curve Cryptography

Ali Mert SÜLÇE

Institute of Applied Mathematics

e171981@metu.edu.tr

Place: IAM S209

Date/Time: 07.11.2016 -14.30

Abstract: Although studies in elliptic curves date back to middle of nineteenth century, the inception of elliptic curve cryptography(ECC) is 1985 by Koblitzs and Millers proposal that is based on the discrete logarithm problem on an elliptic curve defined over a finite field. After that date, there are a lot of advances and studies in ECC. After giving basic information and general scheme of cryptography,this presentation would mainly concentrate on basic idea and computations of ECC. I would also mention what the advantages of ECC compare to other public key cryptosystems. At the end of presentation, I briefly talk about the further questions in ECC.

End-to-End Encryption

Seyma Fetvacı

Institute of Applied Mathematics

e171960@metu.edu.tr

Place: Cryptology Lab.

Date/Time: 01.11.2016 -14.30

Abstract: With the great advance of the technology, online communication has taken an important role in people’s lives and protecting the people from the harm caused by online communication has even become more important since the very begginning. In this speech, I will focus on the End-to-End Encryption which is mostly used by Whatsapp to protect the data of the user from the third party. I will mainly talk about how it works, what the importance is and the timing of its revealing. In summarizing the talk, I will also mention its area of usage.