|
First session
|
| 19:30 |
Kahn Ni Melm - John Steinbeck's Secret Language |
John Corey |
| 19:35 |
NIST Update |
John Kelsey |
| 19:40 |
SHAPE and EXPAND: Two New Hashing Constructions |
John Kelsey |
| 19:43 |
Property Preserving Hashes |
Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan |
| 19:47 |
Surveillance from Brussels: Privacy at UCSB |
Jean-Jacques Quisquater |
| 19:49 |
Blockchain and the Identity Problem |
Jean-Jacques Quisquater |
| 19:52 |
Blockchain! |
Jon Callas |
| 19:56 |
What does the SHARK say? |
Mariana Raykova, Eran Tromer, Madars Virza |
| 20:01 |
BODKA: Not B, But V |
Rakyong Choi, Kwangjo Kim |
| 20:04 |
Setup-Free SNARKs from Hidden Order Groups (Or: How to win an argument in one sentence) |
Russell W. F. Lai, Giulio Malavolta |
| 20:08 |
Memory extraction attacks against crypto-currency wallets on Android (& a crypto winter school in China) |
Yuyao Zhang, Juanru Li, Yu Yu |
| 20:11 |
Towards a general classification framework for cryptocurrency |
Ghada Almashaqbeh, Allison Bishop, Yevgeniy Dodis, Luke Kowalczyk, Tal Malkin, Eran Tromer, Mariana Raykova, Kevin Shi |
| |
|
|
| 20:17 |
Break! |
|
| |
|
Second session
|
| 20:45 |
Attestation as a Service (AaaS) |
Daniel Genkin |
| 20:52 |
Announcing This Year's Theory of Cryptography Conference Test-of-Time Award Recipients |
Jesper Buus Nielsen |
| 20:54 |
Gigabit True Random Number Generator Using Image Sensor Noise |
James Hughes, Yash Gupta |
| 20:58 |
Synesthesia |
Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer |
| 21:02 |
RISC V Foundation Security Standing Committee: Call to Action!! |
Helena Handschuh |
| 21:05 |
Zero Knowledge Standardization |
Muthuramakrishnan Venkitasubramaniam |
| 21:07 |
The CERES project |
Ivan Damgård, Zahra Jafragholi |
| 21:10 |
A Small Problem |
Eran Lambooij |
| 21:13 |
Adversarial Correctness Favors Laziness |
Serge Vaudenay |
| 21:16 |
Prime and Prejudice: Primality Testing Under Adversarial Conditions |
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky |
| 21:19 |
Stand-up Crypto Comedy |
Tore K. Frederiksen |
| 21:23 |
Account Management and Stake Pools in Proof of Stake Ledgers |
Mario Larangeira, Dimitris Karakostas, Aggelos Kiayias |
| 21:26 |
How to mimic Bitcoin blockchain via proof of stake, and more |
Hong-Sheng Zhou |
| 21:32 |
A Consensus Taxonomy in the Blockchain Era |
Juan Garay, Aggelos Kiayias |
| 21:37 |
Don't worry, be happy |
Daniel Escudero |
| |
|
|
| 21:40 |
Break! |
|
| |
|
Third session
|
| 22:00 |
Cryptography for #metoo |
Benjamin R. Kuykendall, Hugo Krawczyk, Tal Rabin |
| 22:04 |
Obfuscation using Tensor Products |
Craig Gentry, Charanjit Jutla |
| 22:10 |
Upgrade to Functional Encryption |
Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters |
| 22:13 |
Let a Non-Barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog |
Sherman Chow, Alex Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou |
| 22:18 |
Cryptographic Anomaly Trigger attack on Secure Operations for Crypto Key Storage (CAT SOCKS) |
Luke Teyssier |
| 22:21 |
Key and Input Homomorphic PRFs with Homomorphism Induced Variable Input Length |
Vipin Singh Sehrawat, Yvo Desmedt |
| 22:25 |
PQCzoo: Post-Quantum Beasts and Where to Find Them |
James Howe, Marco Martinoli |
| 22:29 |
nuFHE: reaching 0.13 ms/gate for fully homomorphic encryption with Python |
Bogdan Opanchuk |
| 22:32 |
Secure MPC: Laziness Leads to GOD |
Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai |
| 22:36 |
Laconic Function Evaluation |
Willy Quach, Hoeteck Wee, Daniel Wichs |
| 22:39 |
A Key Recovery Attack on 27 Round Simon-32/64 and Simeck/32-64 using Correlated Sequences |
Raghvendra Rohit, Guang Gong |
| 22:42 |
Statistical Ineffective Fault Attacks |
Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas |
| 22:44 |
Computational Ring-LWR problem |
Long Chen, Zhenfeng Zhang, Zhenfei Zhang |
| 22:47 |
RSA-OAEP without Random Oracles, Featuring Eminem |
Nairen Cao, Adam O'Neill, Mohammad Zaheri |
| |
|
|
| 22:51 |
Good night! |
|
| |
|
Announcements
|
| Shown during the breaks:
|
| |
Simula UiB seeking senior cryptographers |
Håvard Raddum |
| |
New NSF SaTC Solicitation |
Susanne Wetzel |
| |
Call for Paper: CODE BLUE 2018 |
Shin'ichiro Matsuo |
| |
Call for Participation: Scaling Bitcoin |
Shin'ichiro Matsuo |
| |
Eurocrypt 2019 Call for Affiliated Events |
Felix Günther, Christian Janson |
| |
Stanford Blockchain Conference |
Benedikt Bünz |
| |
14th International Workshop on Security (IWSEC2019), 28-30 August, 2019 |
Yuji Suga |
| |
Homomorphic Encryption Standardization |
Shai Halevi |
| |
Privacy Preserving Machine Learning Workshop co-located with NIPS |
Mariana Raykova |