First session
|
19:45 | Opening | Martijn Stam |
19:47 | Borg Early Career Award (BECA) | CRA-WP (Computing Research Association - Widening Participation) |
19:52 | Cards Against Cryptography | Anonymous |
19:55 | Cryptanalyzing the Legendre PRF | Dankrad Feist |
19:59 | Trivial Real World Crypto | Greg Rose |
20:03 | The Grand Unified Theory of Cryptology | Christian Cachin |
20:06 | He Gives C-Sieves on the CSIDH | Chris Peikert |
20:12 | New Conference on Information-Theoretic Cryptography (ITC) | Benny Applebaum, Ivan Damgård, Yevgeniy Dodis, Yuval Ishai, Ueli Maurer, Kobbi Nissim, Krzysztof Pietrzak, Manoj Prabhakaran, Adam Smith, Yael Kalai, Stefano Tessaro, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs, Mary Wootters, Chaoping Xing, Moti Yung
|
| | |
20:15 | BREAK I | |
|
Second session
|
20:45 | PQC Wiki | Edoardo Persichetti |
20:49 | decodingchallenge.org | Julien Lavauzelle, Matthieu Lequesne, Nicolas Aragon |
20:53 | STARK friendly hash challenge | Tomer Ashur, Eli Ben-Sasson, Lior Goldberg, Michael Riabzev |
20:55 | DH(E) and the leading zeros in the premaster secret in TLS 1.1/1.2 | Saravanan Musuwathi Kesavan |
21:00 | 48ce563f89a0ed9414f5aa28ad0d96d6795f9c62 | Nadia Heninger, Travis Scholl, Dan Shumow |
21:05 | On parameter choices of Round5 | Yongha Son |
21:09 | You are strong, FALCON, but we will break you! | Pierre-Alain Fouque, Paul Kirchner, Mehdi Tibouchi, Alexandre Wallet, Yang Yu |
21:14 | Implementing Signal | Yi Tang, Yevgeniy Dodis |
21:20 | Microsoft's ElectionGuard | Josh Benaloh |
21:25 | RSA Encraption | Dan Shumow, Brian LaMacchia |
21:30 | Bringing Verifiable Delay Functions Into Production | Kelly Olson |
21:33 | OPA!!! | Muhammad Ishaq, Ana Milanova, Vassilis Zikas |
21:37 | PKC 2020 in Edinburgh | Vassilis Zikas |
| | |
21:40 | BREAK II | |
|
Third session
|
22:00 | NIST Update | John Kelsey, Luis Brandao, Meltem Sonmez Turan, Lily Chen, Dustin Moody, Elaine Barker |
22:06 | Key Words | Hilarie Orman |
22:11 | Algebraically Structured LWE, Revisited | Chris Peikert, Zachary Pepin |
22:16 | Synchronous Consensus with Optimal Asynchronous Fallback: The Crypto Chickens Go to the Beach | Erica Blum, Jonathan Katz, Julian Loss |
22:21 | Asymmetric distributed trust | Christian Cachin, Björn Tackmann |
22:26 | Collusion-Preserving Computation without a Mediator | Michele Ciampi, Yun Lu, Vassilis Zikas |
22:30 | On the Round Complexity of Randomized Byzantine Agreement | Ran Cohen, Iftach Haitner, Nikolaos Makriyannis, Matan Orland, Alex Samorodnitsky |
22:33 | DARPA Cryptographic Research | Joshua Baron |
22:38 | Winkle: Protecting Proof-of-Stake Blockchains From Long-Range Attacks | Sarah Azouvi, George Danezis, Valeria Nikolaenko |
22:43 | A new Paradigm Shift for the Crypto BlockChain: Proof of Ability | Olivier Blazy, Orr Dunkelman |
22:46 | International Olympiad in Cryptography NSUCRYPTO | Valeriya Idrisova, Natalia Tokareva, Anastasiya Gorodilova et al. |
22:48 | The Chia Proof of Space construction and implementation competition | Bram Cohen |
22:50 | Close | |
|
Announcements
|
Shown during the breaks:
|
| RWC 2020 Announcement and Call for Contributed Talks | Brian LaMacchia |
| CT-RSA 2020 | Stanislaw Jarecki |
| ASK 2019 | Yu Sasaki |
| SPOOK | FX Standaert |
| Post-Quantum / Post-Brexit Cryptography | James Howe |
| Open Positions at Monash University: Crypto, Blockchain, Cybersecurity | Ron Steinfeld |