skip to content
 

Seminars (SASW02)

Videos and presentation materials from other INI events are also available.

Search seminar archive

Event When Speaker Title Presentation Material
SASW02 10th April 2012
10:00 to 11:00
Verifying Crypto Protocols Written in C
SASW02 10th April 2012
11:30 to 12:30
Multi-key Homomorphic Encryption and Applications
SASW02 10th April 2012
13:30 to 14:30
Compositionality of game-based secure key-exchange
SASW02 10th April 2012
14:30 to 15:30
Rational Proofs
SASW02 10th April 2012
16:00 to 17:00
Constructive cryptography
SASW02 11th April 2012
09:00 to 10:00
P Rogaway Foundations of Garbled Circuits
SASW02 11th April 2012
10:00 to 11:00
M Fischlin Meta-Reductions
SASW02 11th April 2012
11:30 to 12:30
Pairing-based succinct non-interactive zero-knowledge arguments
SASW02 11th April 2012
13:30 to 14:30
From crypto verif specifications to computationally secure implementations of protocols
SASW02 11th April 2012
14:30 to 15:30
C Gentry Quadratic Span Programs for Succinct NIZKs without PCPs
SASW02 11th April 2012
16:00 to 17:00
How to Compute in the Presence of Leakage
SASW02 12th April 2012
09:00 to 10:00
Definitions of Predicate Encryption
SASW02 12th April 2012
10:00 to 11:00
How provably secure are cryptographic primitives used in practice
SASW02 12th April 2012
11:30 to 12:30
D Pointcheval Efficient Smooth Projective Hash Functions and Applications
SASW02 12th April 2012
13:30 to 14:30
Leakage-Resilient Zero-Knowledge Proofs and their Applications
SASW02 12th April 2012
14:30 to 15:30
Where Delegation Meets Einstein
SASW02 12th April 2012
16:00 to 17:00
Semantic security for the wiretap channel
SASW02 12th April 2012
17:00 to 18:00
Rothschild Lecture: Pseudo Deterministic Algorithms and Applications to Cryptography
SASW02 13th April 2012
09:00 to 10:00
M Naor The Privacy of the Analyst and The Power of the State
SASW02 13th April 2012
10:00 to 11:00
How to fake auxiliary input
SASW02 13th April 2012
11:30 to 12:30
B Barak Zero Knowledge Proofs and Nuclear Disarmament
SASW02 13th April 2012
13:30 to 14:30
C Fournet Cryptographically verified implementation of TLS 1.2
SASW02 13th April 2012
14:30 to 15:30
Y Dodis Overcoming Weak Expectations
SASW02 13th April 2012
16:00 to 17:00
Computer-aided security proofs
University of Cambridge Research Councils UK
    Clay Mathematics Institute London Mathematical Society NM Rothschild and Sons