First session
|
19:30 |
Kahn Ni Melm - John Steinbeck's Secret Language |
John Corey |
19:35 |
NIST Update |
John Kelsey |
19:40 |
SHAPE and EXPAND: Two New Hashing Constructions |
John Kelsey |
19:43 |
Property Preserving Hashes |
Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan |
19:47 |
Surveillance from Brussels: Privacy at UCSB |
Jean-Jacques Quisquater |
19:49 |
Blockchain and the Identity Problem |
Jean-Jacques Quisquater |
19:52 |
Blockchain! |
Jon Callas |
19:56 |
What does the SHARK say? |
Mariana Raykova, Eran Tromer, Madars Virza |
20:01 |
BODKA: Not B, But V |
Rakyong Choi, Kwangjo Kim |
20:04 |
Setup-Free SNARKs from Hidden Order Groups (Or: How to win an argument in one sentence) |
Russell W. F. Lai, Giulio Malavolta |
20:08 |
Memory extraction attacks against crypto-currency wallets on Android (& a crypto winter school in China) |
Yuyao Zhang, Juanru Li, Yu Yu |
20:11 |
Towards a general classification framework for cryptocurrency |
Ghada Almashaqbeh, Allison Bishop, Yevgeniy Dodis, Luke Kowalczyk, Tal Malkin, Eran Tromer, Mariana Raykova, Kevin Shi |
|
|
|
20:17 |
Break! |
|
|
Second session
|
20:45 |
Attestation as a Service (AaaS) |
Daniel Genkin |
20:52 |
Announcing This Year's Theory of Cryptography Conference Test-of-Time Award Recipients |
Jesper Buus Nielsen |
20:54 |
Gigabit True Random Number Generator Using Image Sensor Noise |
James Hughes, Yash Gupta |
20:58 |
Synesthesia |
Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer |
21:02 |
RISC V Foundation Security Standing Committee: Call to Action!! |
Helena Handschuh |
21:05 |
Zero Knowledge Standardization |
Muthuramakrishnan Venkitasubramaniam |
21:07 |
The CERES project |
Ivan Damgård, Zahra Jafragholi |
21:10 |
A Small Problem |
Eran Lambooij |
21:13 |
Adversarial Correctness Favors Laziness |
Serge Vaudenay |
21:16 |
Prime and Prejudice: Primality Testing Under Adversarial Conditions |
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky |
21:19 |
Stand-up Crypto Comedy |
Tore K. Frederiksen |
21:23 |
Account Management and Stake Pools in Proof of Stake Ledgers |
Mario Larangeira, Dimitris Karakostas, Aggelos Kiayias |
21:26 |
How to mimic Bitcoin blockchain via proof of stake, and more |
Hong-Sheng Zhou |
21:32 |
A Consensus Taxonomy in the Blockchain Era |
Juan Garay, Aggelos Kiayias |
21:37 |
Don't worry, be happy |
Daniel Escudero |
|
|
|
21:40 |
Break! |
|
|
Third session
|
22:00 |
Cryptography for #metoo |
Benjamin R. Kuykendall, Hugo Krawczyk, Tal Rabin |
22:04 |
Obfuscation using Tensor Products |
Craig Gentry, Charanjit Jutla |
22:10 |
Upgrade to Functional Encryption |
Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters |
22:13 |
Let a Non-Barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog |
Sherman Chow, Alex Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou |
22:18 |
Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage (CAT SOCKS) |
Luke Teyssier |
22:21 |
Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length |
Vipin Singh Sehrawat, Yvo Desmedt |
22:25 |
PQCzoo: Post-Quantum Beasts and Where to Find Them |
James Howe, Marco Martinoli |
22:29 |
nuFHE: reaching 0.13 ms/gate for fully homomorphic encryption with Python |
Bogdan Opanchuk |
22:32 |
Secure MPC: Laziness Leads to GOD |
Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai |
22:36 |
Laconic Function Evaluation |
Willy Quach, Hoeteck Wee, Daniel Wichs |
22:39 |
A Key Recovery Attack on 27 Round Simon-32/64 and Simeck/32-64 using Correlated Sequences |
Raghvendra Rohit, Guang Gong |
22:42 |
Statistical Ineffective Fault Attacks |
Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas |
22:44 |
Computational Ring-LWR problem |
Long Chen, Zhenfeng Zhang, Zhenfei Zhang |
22:47 |
RSA-OAEP without Random Oracles, Featuring Eminem |
Nairen Cao, Adam O'Neill, Mohammad Zaheri |
|
|
|
22:51 |
Good night! |
|
|
Announcements
|
Shown during the breaks:
|
|
Simula UiB seeking senior cryptographers |
Håvard Raddum |
|
New NSF SaTC Solicitation |
Susanne Wetzel |
|
Call for Paper: CODE BLUE 2018 |
Shin'ichiro Matsuo |
|
Call for Participation: Scaling Bitcoin |
Shin'ichiro Matsuo |
|
Eurocrypt 2019 Call for Affiliated Events |
Felix Günther, Christian Janson |
|
Stanford Blockchain Conference |
Benedikt Bünz |
|
14th International Workshop on Security (IWSEC2019), 28-30 August, 2019 |
Yuji Suga |
|
Homomorphic Encryption Standardization |
Shai Halevi |
|
Privacy Preserving Machine Learning Workshop co-located with NIPS |
Mariana Raykova |