DIMACS Workshop on Current Trends in Cryptology
April 29 - May 1, 2013
AT & T Building
33 Thomas Street
New York City, New York
- Organizers:
- David Cash, Rutgers University, david.cash at cs.rutgers.edu
- Martijn Stam, University of Bristol, Martijn.Stam at bristol.ac.uk
- Yevgeniy Vahlis, AT&T Security Research Center, evahlis at att.com
Presented under the auspices of the DIMACS Special
Focus on Cybersecurity.
Workshop Program:
Monday, April 29, 2013
8:45 - 9:15 Breakfast & Registration
9:15 - 9:30 Rebecca Wright, DIMACS - Director's Welcome
9:30 - 10:00 Dynamic Proofs of Retrievability via Oblivious RAM
Daniel Wichs, Northeastern
10:00 - 10:30 Fully Homomorphic Message Authenticators
Rosario Gennaro, CCNY
10:30 - 11:00 Coffee Break
11:00 - 11:30 Message-Locked Encryption and Secure Deduplication
Thomas Ristenpart, U Wisconsin
11:30 - 12:30 Key Derivation Without Entropy Waste
Yevgeniy Dodis, NYU
12:30 - 2:00 Lunch
2:00 - 2:30 Candidate Constructions for Functional Encryption and Best Possible Obfuscation
Craig Gentry, IBM
2:30 - 3:00 Attribute-Based Encryption for Circuits
Hoeteck Wee, George Washington U
3:00 - 3:30 Reusable Garbled Circuits and Succinct Functional Encryption
Yael Kalai, MSR
3:30 - 4:00 Coffee Break
4:00 - 4:30 Interactive Coding, Revisited
Rafael Pass, Cornell
4:30 - 5:00 Controlled Malleability for NIZK and Signatures: Definitions, Constructions and Applications
Anna Lysyanskaya, Brown
5:00 - 5:30 Legal Challenges of Addressing Computer Insecurity While
Protecting Privacy and Free Expression, Or 'Why Aren't We Using These Crypto Tools?'
Timothy Edgar, Brown
Tuesday, April 30, 2013
9:00 - 9:30 Breakfast & Registration
9:30 - 10:00 Concurrently Secure Computation in the Multiple Ideal Query Model
Abhishek Jain, Boston University/MIT
10:00 - 10:30 Constant-Round Concurrent Zero Knowledge From P-Certificates
Huija R. Lin, Boston University/MIT
10:30 - 11:00 Coffee Break
11:00 - 12:00 Searchable Encryption in the Real World: Theory and Practice
Hugo Krawczyk, IBM
12:00 - 12:30 Scalable Private Database Querying for Arbitrary Formulas
Vlad Kolesnikov, Bell Labs
12:30 - 2:00 Lunch
2:00 - 2:30 Broadcast Steganography
Nelly Fazio, CCNY
2:30 - 3:00 Inchworm: Secure Computation, One Step at a Time
Tal Moran, IDC, Israel
3:00 - 3:30 Hard Learning Problems Over Non-Commutative Groups
Antonion Nicolosi, Stevens
3:30 - 4:00 Coffee Break
4:00 - 4:30 Decision Procedures for Simulatability
Charanjit Jutla, IBM
4:30 - 5:00 The Garden-Hose Model
Christian Schaffner, U Amsterdam
5:00 - 5:30 Crypto at the Age of Extreme Attacks
Moti Yung, Google
Wednesday, May 1, 2013
9:00 - 9:30 Breakfast & Registration
9:30 - 10:00 A Full Characterization of Completeness for Two-party Randomized Function Evaluation
Manoj Prabakharan, UIUC
10:00 - 10:30 Rational Protocol Design: Cryptographic Security Against Incentive-driven Attacks
Vassilis Zikas, UCLA
10:30 - 11:00 Coffee Break
11:00 - 11:30 Christian Rechberger, DTU, Denmark - TBA
11:30 - 12:30 SHA3: Where We've Been and Where We're Going
Bill Burr, NIST
12:30 - 2:00 Lunch
2:00 - 2:30 Anonymous yet Authentic: Secure Multiparty Computation in the Two-Tier Trust Model
Aggelos Kiayias, U Athens
2:30 - 3:00 Secure Computation on Sparse Networks in the Presence of Malicious Nodes and Edges
Nishanth Chandran, AT&T
3:00 - 3:30 Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
Tal Malkin, Columbia
3:30 - 4:00 Coffee Break
4:00 - 4:30 On the (Im)Possibility of Tamper-Resilient Cryptography
Mohammad Mahmoody, Cornell
4:30 - 5:00 Can Theories be Tested? A Cryptographic Treatment of Forecast Testing
Kai-Min Chung, Cornell
5:00 - 5:30 Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy
Adam Smith, Penn State
5:30 - 7:00 Farewell Cocktail at Anotheroom (249 W Broadway)
Previous: Participation
Next: Registration
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on April 24, 2013.