SASW02 |
10th April 2012 10:00 to 11:00 |
A Gordon |
Verifying Crypto Protocols Written in C |
|
SASW02 |
10th April 2012 11:30 to 12:30 |
V Vaikuntanathan |
Multi-key Homomorphic Encryption and Applications |
|
SASW02 |
10th April 2012 13:30 to 14:30 |
B Warinschi |
Compositionality of game-based secure key-exchange |
|
SASW02 |
10th April 2012 14:30 to 15:30 |
S Micali |
Rational Proofs |
|
SASW02 |
10th April 2012 16:00 to 17:00 |
U Maurer |
Constructive cryptography |
|
SASW02 |
11th April 2012 09:00 to 10:00 |
P Rogaway |
Foundations of Garbled Circuits |
|
SASW02 |
11th April 2012 10:00 to 11:00 |
M Fischlin |
Meta-Reductions |
|
SASW02 |
11th April 2012 11:30 to 12:30 |
J Groth |
Pairing-based succinct non-interactive zero-knowledge arguments |
|
SASW02 |
11th April 2012 13:30 to 14:30 |
B Blanchet |
From crypto verif specifications to computationally secure implementations of protocols |
|
SASW02 |
11th April 2012 14:30 to 15:30 |
C Gentry |
Quadratic Span Programs for Succinct NIZKs without PCPs |
|
SASW02 |
11th April 2012 16:00 to 17:00 |
G Rothblum |
How to Compute in the Presence of Leakage |
|
SASW02 |
12th April 2012 09:00 to 10:00 |
P Persiano |
Definitions of Predicate Encryption |
|
SASW02 |
12th April 2012 10:00 to 11:00 |
E Kiltz |
How provably secure are cryptographic primitives used in practice |
|
SASW02 |
12th April 2012 11:30 to 12:30 |
D Pointcheval |
Efficient Smooth Projective Hash Functions and Applications |
|
SASW02 |
12th April 2012 13:30 to 14:30 |
A Sahai |
Leakage-Resilient Zero-Knowledge Proofs and their Applications |
|
SASW02 |
12th April 2012 14:30 to 15:30 |
Y Tauman Kalai |
Where Delegation Meets Einstein |
|
SASW02 |
12th April 2012 16:00 to 17:00 |
S Tessaro |
Semantic security for the wiretap channel |
|
SASW02 |
12th April 2012 17:00 to 18:00 |
S Goldwasser |
Rothschild Lecture: Pseudo Deterministic Algorithms and Applications to Cryptography |
|
SASW02 |
13th April 2012 09:00 to 10:00 |
M Naor |
The Privacy of the Analyst and The Power of the State |
|
SASW02 |
13th April 2012 10:00 to 11:00 |
C Pietrzak |
How to fake auxiliary input |
|
SASW02 |
13th April 2012 11:30 to 12:30 |
B Barak |
Zero Knowledge Proofs and Nuclear Disarmament |
|
SASW02 |
13th April 2012 13:30 to 14:30 |
C Fournet |
Cryptographically verified implementation of TLS 1.2 |
|
SASW02 |
13th April 2012 14:30 to 15:30 |
Y Dodis |
Overcoming Weak Expectations |
|
SASW02 |
13th April 2012 16:00 to 17:00 |
G Barthe |
Computer-aided security proofs |
|