Crypto 2018
August 19-23, 2018
Affiliated events
August 17-19, 2018
Santa Barbara, USA
Affiliated Events
Organizers: Elette Boyle (chair), Fabrice Benhamouda, Tal RabinFriday, August 17, 2018
Blockchain technologies, including cryptocurrencies such as Bitcoin and Ethereum, are emerging as an innovative approach to achieve societal functions (such as fiat money) that have so far required the backing of governments and institutions. Blockchain technologies crucially depend on distributed algorithms and cryptographic mechanisms to ensure their efficiency and security properties. This event will bring together experts, leaders, and advocates from a broad set of relevant disciplines (including distributed computation, cryptography, social sciences, and crypto-currencies) to discuss recent exciting progress and current open problems in this area.
More information on the website of the event.
Saturday, August 18, 2018
Blockchain technologies, including cryptocurrencies such as Bitcoin and Ethereum, are emerging as an innovative approach to achieve societal functions (such as fiat money) that have so far required the backing of governments and institutions. Blockchain technologies crucially depend on distributed algorithms and cryptographic mechanisms to ensure their efficiency and security properties. This event will bring together experts, leaders, and advocates from a broad set of relevant disciplines (including distributed computation, cryptography, social sciences, and crypto-currencies) to discuss recent exciting progress and current open problems in this area.
More information on the website of the event.
Quantum-Safe cryptography is now a topic of major industrial interest. This is mainly driven by the fact that the topic has received recently much attention from the standardization and policy spectra such as NIST, ETSI, CSA, etc.
The security industry is now facing new challenges inherent to large-scale deployment of the next generations of public-key cryptography. The goal of the QsCI workshop is to create a forum to discuss the construction and industrial deployment of quantum-safe cryptosystems. The event will include a selection of speakers in the area of quantum-safe cryptography with a strong focus on the future industrial challenges for deploying quantum-safe cryptography.
More information on the website of the event.
Cryptography is often thought of as the "bright spot" of practical security, a mathematical paradise where security can be rigorously proven and issues like buffer overflows are in someone else’s department. However, there is a growing community of researchers who regularly find serious flaws in widely deployed cryptographic implementations and protocols. In recent years, this type of research has mostly been published in systems security conferences. This workshop will bring together researchers who work on cryptographic attacks and provide a showcase of their work for the Crypto community.
More information on the website of the event.
Sunday, August 19, 2018
The foundational study of cryptography has had far-reaching impact in computer science and beyond. In turn, cryptography has benefitted greatly from advances and challenges raised in a host of disciplines. This deep, rich, and mutually-beneficial web of connections spans varied fields such as complexity theory, machine learning, game theory, distributed computing, the study of privacy and fairness in statistical data analysis, quantum computation, data structures, coding theory and more.
Developing such connections, and unearthing new ones, is vital to the future success of cryptography. The goal of this workshop is highlighting work and research avenues that can broaden the reach and impact of cryptography and open the door to fruitful interactions and connections between the foundations of cryptography and other fields in and beyond computer science.
Towards this end, the workshop program will include a carefully curated collection of tutorials and talks about recent developments in related fields that raise challenges that would benefit from study through the "cryptographic lens," as well as breakthroughs in cryptography that have the potential for broad impact in and beyond the field.
More information on the website of the event.
After more than three years of close collaboration between the Internet engineering (IETF) and the scientific crypto communities, TLS 1.3 — the next generation TLS/SSL protocol — is ready as a fully specified standard offering a modern protocol with better performance and stronger security than its predecessors. This collaborative design process has produced a remarkable body of cryptographic work covering all aspects of TLS 1.3 from basic protocol design to detailed specification, in particular showcasing the power of automated analysis of real-world crypto protocols. The workshop will be comprised of invited lectures covering some of the most interesting aspects of TLS 1.3, including motivation, design and analysis.
More information on the website of the event.
The public policy debate over encryption has focused primarily on the use of encryption to protect the confidentiality of communications and stored data. For those who fear unrestrained government surveillance, encryption is an obvious technical response. Governments around the world are asking whether the increasing use of encryption is a problem or essential to meeting growing security threats. One the one hand, the worry is that law enforcement and security agencies are increasingly "going dark." At the same time, forcing exceptional access features into existing security protocols creates additional security risk. A variety of technical and administrative measures have been proposed to address law enforcement and privacy concerns. Cryptographic-computing techniques (such as search on encrypted data) can enable intelligence collection with better privacy guarantees and expanded accountability measures can increase confidence in the rule of law. This workshop will examine how encryption and related technologies pose both challenges and opportunities for surveillance and reform of surveillance.
More information on the website of the event.
MathCrypt aims to provide a forum for exchanging ideas on new mathematical assumptions and attacks in cryptography. Its scope includes, but is not limited to:
- Introducing new assumptions which can be used to construct or improve crypto schemes.
- Proposing attacks on cryptographic assumptions, which is worthy to be considered.
- Implementation improvements for cryptographic schemes and attacks.
More information on the website of the event.