Skip to content

Workshop Programme

for period 10-13 April

Formal and Computational Cryptographic Proofs

10-13 April

Timetable

Tuesday 10 April
09:00-09:55 Registration SAS
09:55-10:00 Welcome from Christie Marr (INI Deputy Director) & Annoucements SAS
10:00-11:00 Gordon, A (Microsoft Research) SAS
  Verifying Crypto Protocols Written in C Sem 1
11:00-11:30 Morning Coffee SAS
11:30-12:30 Vaikuntanathan, V (Toronto) SAS
  Multi-key Homomorphic Encryption and Applications Sem 1
12:30-13:30 Lunch at Wolfson Court SAS
13:30-14:30 Warinschi, B (Bristol) SAS
  Compositionality of game-based secure key-exchange Sem 1
14:30-15:30 Micali, S (MIT) SAS
  Rational Proofs Sem 1
15:30-16:00 Afternoon Tea SAS
16:00-17:00 Maurer, U (ETH Zürich) SAS
  Constructive cryptography Sem 1
17:00-18:00 Welcome Drinks Reception SAS
Wednesday 11 April
09:00-10:00 Rogaway, P (UC, Davis) SAS
  Foundations of Garbled Circuits Sem 1
10:00-11:00 Fischlin, M (TU, Darmstadt) SAS
  Meta-Reductions Sem 1
11:00-11:30 Morning Coffee SAS
11:30-12:30 Groth, J (UCL) SAS
  Pairing-based succinct non-interactive zero-knowledge arguments Sem 1
12:30-13:30 Lunch at Wolfson Court SAS
13:30-14:30 Blanchet, B (ENS) SAS
  From crypto verif specifications to computationally secure implementations of protocols Sem 1
14:30-15:30 Gentry, C (IBM Research) SAS
  Quadratic Span Programs for Succinct NIZKs without PCPs Sem 1
15:30-16:00 Afternoon Tea SAS
16:00-17:00 Rothblum, G (Microsoft Research) SAS
  How to Compute in the Presence of Leakage Sem 1
Thursday 12 April
09:00-10:00 Persiano, P (Salerno) SAS
  Definitions of Predicate Encryption Sem 1
10:00-11:00 Kiltz, E (Ruhr-Universität Bochum) SAS
  How provably secure are cryptographic primitives used in practice Sem 1
11:00-11:30 Morning Coffee SAS
11:30-12:30 Pointcheval, D (ENS - Paris) SAS
  Efficient Smooth Projective Hash Functions and Applications Sem 1
12:30-13:30 Lunch at Wolfson Court SAS
13:30-14:30 Sahai, A (UCLA) SAS
  Leakage-Resilient Zero-Knowledge Proofs and their Applications Sem 1
14:30-15:30 Tauman Kalai, Y SAS
  Where Delegation Meets Einstein Sem 1
15:30-16:00 Afternoon Tea SAS
16:00-17:00 Tessaro, S (Massachusetts Institute of Technology) SAS
  Semantic security for the wiretap channel Sem 1
17:00-18:00 Goldwasser, S (MIT) SAS
  Rothschild Lecture: Pseudo Deterministic Algorithms and Applications to Cryptography Sem 1
19:30-22:00 Conference Dinner at Gonville and Caius College SAS
Friday 13 April
09:00-10:00 Naor, M (Weizmann Institute of Science) SAS
  The Privacy of the Analyst and The Power of the State Sem 1
10:00-11:00 Pietrzak, C (IST Austria) SAS
  How to fake auxiliary input Sem 1
11:00-11:30 Morning Coffee SAS
11:30-12:30 Barak, B (Microsoft Research New England) SAS
  Zero Knowledge Proofs and Nuclear Disarmament Sem 1
12:30-13:30 Lunch at Wolfson Court SAS
13:30-14:30 Fournet, C (Microsoft Research) SAS
  Cryptographically verified implementation of TLS 1.2 Sem 1
14:30-15:30 Dodis, Y (New York) SAS
  Overcoming Weak Expectations Sem 1
15:30-16:00 Afternoon Tea SAS
16:00-17:00 Barthe, G (Madrid Institute of Advanced Studies (IMDEA)) SAS
  Computer-aided security proofs Sem 1
Other Seminars
Seminars in the University
National and International Scientific Research Meetings

Back to top ∧