Monday, January 13
Session 1: Bitcoin
9:00am
Arvind Narayanan | Princeton University
Is Bitcoin Anonymous?
9:30am
Matthew Green | JHU
Anonymizing Cryptocurrencies: How to make Bitcoin Anonymous
10:00am
Yifu Guo | Avalon
Bitcoin
10:30am
Coffee Break
Session 2: Securing the Internet
11:00am
Hoeteck Wee | ENS – Paris
On the Security of SSL/TLS
11:30am
Brian Warner | Mozilla
Firefox Sync: Securely Sharing Browser Data
12:00pm
Lunch
Session 3: Practical Multi-Party Computation
2:00pm
John Launchbury | Galois
Accelerating Secure Shared Computations to Useable Speeds
2:30pm
Jakob Illeborg Pagter | Partisia/Alexandra Institute
Multiparty Computation or: How I Learned to Stop Worrying and Love Cloud
3:00pm
Yehuda Lindell | Bar-Ilan University and Dyadic Security
Secure Multi-Party Computation: Background
Mitigating Server Breaches with Secure Computation
3:30pm
Coffee Break
Session 4: Cryptography
4:00pm
Shai Halevi | IBM
Multi-linear Maps
4:30pm
Hugo Krawczyk | IBM
Recent Advances in Encrypted Search
5:00pm Close
Tuesday, January 14
Session 5 : Payment Card Systems
9:00am
Marc Fischlin | TU Darmstadt
Analysis of Opacity
9:30am
Eric Le Saint | Visa Inc.
The Future of OPACITY
10:00am
Coffee Break
Session 6: Cryptography II
10:30am
Jonathan Trostle | Visa Inc.
Authenticated Encryption for Energy Constrained Environments
11:00am
Tom Shrimpton | Portland State University
Protocol Misidentification Made Easy with Format-Transforming Encryption
11:30am
Mike Bond | Cryptomathic
Crypto as a Service: Abracadabra?
12:00pm
Lunch
Session 7: Cryptographic Implementation
2:00pm
Dave Anderson | Seagate
The Architecture of Self-Encrypting Hard Drives
2:30pm
Christian Rechberger | DTU
Symmetric-crypto Research Meets Practice: Low Latency Ciphers
3:00pm
Francois Dupressoir | IMDEA Software Institute
Efficient Provably Secure Machine Code from High-Level Implementations
3:30pm
Coffee Break
Session 8: Short Talk Session
4:00pm
Short Talk Session program
5:00pm
Close
Wednesday, January 15
Session 9: Crypto Applications
9:00am
William Whyte | Security Innovation
A Security Credential Management System for V2V Communications
9:30am
Zooko Wilcox-O’Hearn | Least Authority
Tahoe-LAFS — encrypted peer-to-peer storage
10:00am
Moti Yung | Google
Let’s get Real about the Real World: cryptography facing extreme system breaks
10:30am
Coffee Break
Session 10: The Snowden Revelations
11:00am
Bruce Schneier
The Fallout From Snowden: How can we regain trust in the Internet
11:30am Discussion
12:00pm
Lunch
Session 11: Crypto Applications II
2:00pm
Yevgeniy Dodis | New York University
Random Number Generation, Revisited
2:30pm
Dan Shumow | Microsoft Research
Certificate Reputation: Cryptographic Analysis of Public Keys in Use
3:00pm
Daniele Perito | Square
Secure and Private Service Discovery over Low Energy Bluetooth
3:30pm
Coffee Break
Session 12: Securing the Internet II
4:00pm
Dirk Balfanz | Google
Bringing Crypto Back: Web Authentication without Bearer Tokens
4:30pm
Douglas Stebila | Queensland University of Technology
Provable security of advanced properties of TLS and SSH