Program

Monday, January 13

Session 1: Bitcoin

9:00am
Arvind Narayanan | Princeton University
Is Bitcoin Anonymous?

9:30am
Matthew Green | JHU
Anonymizing Cryptocurrencies: How to make Bitcoin Anonymous

10:00am
Yifu Guo | Avalon
Bitcoin

10:30am
Coffee Break

Session 2: Securing the Internet

11:00am
Hoeteck Wee | ENS – Paris
On the Security of SSL/TLS

11:30am
Brian Warner | Mozilla
Firefox Sync: Securely Sharing Browser Data

12:00pm 
Lunch

Session 3: Practical Multi-Party Computation

2:00pm
John Launchbury | Galois
Accelerating Secure Shared Computations to Useable Speeds

2:30pm
Jakob Illeborg Pagter | Partisia/Alexandra Institute
Multiparty Computation or: How I Learned to Stop Worrying and Love Cloud

3:00pm
Yehuda Lindell | Bar-Ilan University and Dyadic Security
Secure Multi-Party Computation: Background
Mitigating Server Breaches with Secure Computation

3:30pm
Coffee Break

Session 4: Cryptography

4:00pm
Shai Halevi | IBM
Multi-linear Maps

4:30pm
Hugo Krawczyk | IBM
Recent Advances in Encrypted Search

5:00pm Close

Tuesday, January 14

Session 5 : Payment Card Systems

9:00am
Marc Fischlin | TU Darmstadt
Analysis of Opacity

9:30am
Eric Le Saint | Visa Inc.
The Future of OPACITY

10:00am
Coffee Break

Session 6: Cryptography II

10:30am
Jonathan Trostle | Visa Inc.
Authenticated Encryption for Energy Constrained Environments

11:00am 
Tom Shrimpton | Portland State University
Protocol Misidentification Made Easy with Format-Transforming Encryption

11:30am
Mike Bond | Cryptomathic
Crypto as a Service: Abracadabra?

12:00pm
Lunch

Session 7: Cryptographic Implementation

2:00pm
Dave Anderson | Seagate
The Architecture of Self-Encrypting Hard Drives

2:30pm
Christian Rechberger | DTU
Symmetric-crypto Research Meets Practice: Low Latency Ciphers

3:00pm
Francois Dupressoir | IMDEA Software Institute
Efficient Provably Secure Machine Code from High-Level Implementations

3:30pm
Coffee Break

Session 8: Short Talk Session

4:00pm
Short Talk Session program

5:00pm
Close

Wednesday, January 15

Session 9: Crypto Applications

9:00am
William Whyte | Security Innovation
A Security Credential Management System for V2V Communications

9:30am
Zooko Wilcox-O’Hearn | Least Authority
Tahoe-LAFS — encrypted peer-to-peer storage

10:00am 
Moti Yung | Google
Let’s get Real about the Real World: cryptography facing extreme system breaks

10:30am
Coffee Break

Session 10: The Snowden Revelations

11:00am
Bruce Schneier
The Fallout From Snowden: How can we regain trust in the Internet

11:30am Discussion

12:00pm
Lunch

Session 11: Crypto Applications II

2:00pm
Yevgeniy Dodis | New York University
Random Number Generation, Revisited

2:30pm
Dan Shumow | Microsoft Research
Certificate Reputation: Cryptographic Analysis of Public Keys in Use

3:00pm
Daniele Perito | Square
Secure and Private Service Discovery over Low Energy Bluetooth

3:30pm
Coffee Break

Session 12: Securing the Internet II

4:00pm
Dirk Balfanz | Google
Bringing Crypto Back: Web Authentication without Bearer Tokens

4:30pm
Douglas Stebila | Queensland University of Technology
Provable security of advanced properties of TLS and SSH

Advertisements