skip to content
 

Seminars (SASW02)

Videos and presentation materials from other INI events are also available.

Search seminar archive

Event When Speaker Title Presentation Material
SASW02 10th April 2012
10:00 to 11:00
A Gordon Verifying Crypto Protocols Written in C
SASW02 10th April 2012
11:30 to 12:30
V Vaikuntanathan Multi-key Homomorphic Encryption and Applications
SASW02 10th April 2012
13:30 to 14:30
B Warinschi Compositionality of game-based secure key-exchange
SASW02 10th April 2012
14:30 to 15:30
S Micali Rational Proofs
SASW02 10th April 2012
16:00 to 17:00
U Maurer Constructive cryptography
SASW02 11th April 2012
09:00 to 10:00
P Rogaway Foundations of Garbled Circuits
SASW02 11th April 2012
10:00 to 11:00
M Fischlin Meta-Reductions
SASW02 11th April 2012
11:30 to 12:30
J Groth Pairing-based succinct non-interactive zero-knowledge arguments
SASW02 11th April 2012
13:30 to 14:30
B Blanchet From crypto verif specifications to computationally secure implementations of protocols
SASW02 11th April 2012
14:30 to 15:30
C Gentry Quadratic Span Programs for Succinct NIZKs without PCPs
SASW02 11th April 2012
16:00 to 17:00
G Rothblum How to Compute in the Presence of Leakage
SASW02 12th April 2012
09:00 to 10:00
P Persiano Definitions of Predicate Encryption
SASW02 12th April 2012
10:00 to 11:00
E Kiltz How provably secure are cryptographic primitives used in practice
SASW02 12th April 2012
11:30 to 12:30
D Pointcheval Efficient Smooth Projective Hash Functions and Applications
SASW02 12th April 2012
13:30 to 14:30
A Sahai Leakage-Resilient Zero-Knowledge Proofs and their Applications
SASW02 12th April 2012
14:30 to 15:30
Y Tauman Kalai Where Delegation Meets Einstein
SASW02 12th April 2012
16:00 to 17:00
S Tessaro Semantic security for the wiretap channel
SASW02 12th April 2012
17:00 to 18:00
S Goldwasser Rothschild Lecture: Pseudo Deterministic Algorithms and Applications to Cryptography
SASW02 13th April 2012
09:00 to 10:00
M Naor The Privacy of the Analyst and The Power of the State
SASW02 13th April 2012
10:00 to 11:00
C Pietrzak How to fake auxiliary input
SASW02 13th April 2012
11:30 to 12:30
B Barak Zero Knowledge Proofs and Nuclear Disarmament
SASW02 13th April 2012
13:30 to 14:30
C Fournet Cryptographically verified implementation of TLS 1.2
SASW02 13th April 2012
14:30 to 15:30
Y Dodis Overcoming Weak Expectations
SASW02 13th April 2012
16:00 to 17:00
G Barthe Computer-aided security proofs
University of Cambridge Research Councils UK
    Clay Mathematics Institute London Mathematical Society NM Rothschild and Sons