skip to content
 

Seminars (SASW02)

Videos and presentation materials from other INI events are also available.

Search seminar archive

Date Time Speaker Title Presentation Material
10th April 2012 10:00 to 11:00 A Gordon Verifying Crypto Protocols Written in C
10th April 2012 11:30 to 12:30 V Vaikuntanathan Multi-key Homomorphic Encryption and Applications
10th April 2012 13:30 to 14:30 B Warinschi Compositionality of game-based secure key-exchange
10th April 2012 14:30 to 15:30 S Micali Rational Proofs
10th April 2012 16:00 to 17:00 U Maurer Constructive cryptography
11th April 2012 09:00 to 10:00 P Rogaway Foundations of Garbled Circuits
11th April 2012 10:00 to 11:00 M Fischlin Meta-Reductions
11th April 2012 11:30 to 12:30 J Groth Pairing-based succinct non-interactive zero-knowledge arguments
11th April 2012 13:30 to 14:30 B Blanchet From crypto verif specifications to computationally secure implementations of protocols
11th April 2012 14:30 to 15:30 C Gentry Quadratic Span Programs for Succinct NIZKs without PCPs
11th April 2012 16:00 to 17:00 G Rothblum How to Compute in the Presence of Leakage
12th April 2012 09:00 to 10:00 P Persiano Definitions of Predicate Encryption
12th April 2012 10:00 to 11:00 E Kiltz How provably secure are cryptographic primitives used in practice
12th April 2012 11:30 to 12:30 D Pointcheval Efficient Smooth Projective Hash Functions and Applications
12th April 2012 13:30 to 14:30 A Sahai Leakage-Resilient Zero-Knowledge Proofs and their Applications
12th April 2012 14:30 to 15:30 Y Tauman Kalai Where Delegation Meets Einstein
12th April 2012 16:00 to 17:00 S Tessaro Semantic security for the wiretap channel
12th April 2012 17:00 to 18:00 S Goldwasser Rothschild Lecture: Pseudo Deterministic Algorithms and Applications to Cryptography
13th April 2012 09:00 to 10:00 M Naor The Privacy of the Analyst and The Power of the State
13th April 2012 10:00 to 11:00 C Pietrzak How to fake auxiliary input
13th April 2012 11:30 to 12:30 B Barak Zero Knowledge Proofs and Nuclear Disarmament
13th April 2012 13:30 to 14:30 C Fournet Cryptographically verified implementation of TLS 1.2
13th April 2012 14:30 to 15:30 Y Dodis Overcoming Weak Expectations
13th April 2012 16:00 to 17:00 G Barthe Computer-aided security proofs
University of Cambridge Research Councils UK
    Clay Mathematics Institute The Leverhulme Trust London Mathematical Society Microsoft Research NM Rothschild and Sons