Abstract: This workshop aims to provide advice for researchers in early stages (students and junior faculty) and women researchers in the area of cryptography. The workshop will bring together cryptography researchers at different stages of their career to form panels and answer questions for these groups. Besides the live events, the organizers will turn to a large group of cryptography researchers and collect pre- recorded answers and advice from them on a list of interesting questions. These answers will be combined into a set of videos showing various perspectives and be publicly available for the community. As the outcome of this workshop, our mission is to foster a friendly environment where the community can openly share their academic experiences.Workshop website coming soon
Abstract: The study of cryptographic proofs has been an active field of research for over 20 years, since cryptographic constructions and security proofs are notoriously complex. Currently, there are two prominent lines of research that seek to support cryptographic reasoning:
In this workshop, we hope to break down some of the access barriers of the field for those interested in proofs for complex protocols and hope to provide inspiration also to experienced protocol designers and analysts.
The workshop has three goals:
Abstract: MathCrypt aims to provide a forum for exchanging ideas on new mathematical assumptions and attacks in cryptography, and to encourage and attract new researchers to work in the area of mathematical cryptography. Its scope includes, but is not limited to:
Abstract: Artificial intelligence is progressing rapidly. Systems based on machine learning algorithms approach and sometimes even exceed the abilities of human experts. Applications of machine learning involve almost every aspect of our lives, from health care and DNA sequence classification, to financial markets, computer networks and many more. Machine learning algorithms perform better when being exposed to more and more data, but such data is not always accessible due to privacy constraints. Can we train machine learning algorithms on confidential data without ever being exposed to it? Can my model classify your sample without ever seeing it?
The workshop aims to strengthen collaborations among the machine learning and cryptography communities. The scope includes privacy preserving techniques for training, inference, and disclosure. The workshop will consist of few invited talks, together with contributed talks.Workshop website
Abstract: Cryptography is often thought of as the bright spot of practical security, a mathematical paradise where security can be rigorously proven and issues like buffer overflows are in someone else’s department. However, there is a growing community of researchers who regularly find serious flaws in widely deployed cryptographic implementations and protocols. In recent years, this type of research has mostly been published in systems security conferences. This workshop will bring together researchers who work on cryptographic attacks and provide a showcase of their work for the Crypto community. This is the fourth edition of the Workshop on Attacks in Cryptography (WAC) workshop, which has been established by Nadia Heninger.Workshop website coming soon