Crypto 2017 Rump Schedule
Table of Contents
1 First session
19:20 | Program Chair's Report | Jonathan Katz |
19:26 | Forty years and still running | Jean-Jacques Quisquater et al |
19:33 | Blockchains and consensus protocols: Snake oil warning | Christian Cachin |
19:38 | How (not) to pay with Bitcoin | Matteo Campanelli; Rosario Gennaro; Luca Nizzardo; Steven Goldfeder |
19:43 | Proofs of Work for Blockchain Protocols | Juan Garay; Aggelos Kiayias; Giorgos Panagiotakos |
19:46 | The history of blockchains with an application | Jean-Jacques Quisquater |
19:49 | Top secret! A world of codes and ciphers: an exhibition | Jean-Jacques Quisquater |
19:52 | Quantum Computing: Threat or Menace? | Hilarie Orman; Paul Hoffman |
19:55 | The Sound of Quantum | Michael Naehrig |
19:59 | Break! |
2 Second session
20:30 | May the Fourth Be With You: A Microarchitectural Side Channel Attack on Real-World Applications of Curve25519 | Daniel Genkin; Luke Valenta; Yuval Yarom |
20:37 | Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption | Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka |
20:41 | Lockable Obfuscation | Rishab Goyal; Venkata Koppula; Brent Waters |
20:45 | Constraint Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions | Chris Peikert; Sina Shiehian |
20:49 | Real-world zkSNARKs: updates on Zcash, libsnark | Eran Tromer; SCIPR Lab; Zerocash team |
20:55 | The JMAC MAC | Pierre Karpman; Bart Mennink |
20:58 | Self-Correcting Random Oracles and Its Cliptographic Applications | Alexander Russell; Qiang Tang; Moti Yung; Hong-Sheng Zhou |
21:02 | Browser Security with a Grain of Salt | Daniel Genkin; Lev Pachmanov; Eran Tromer; Yuval Yarom |
21:07 | Report from ECC 2017 | Brian LaMacchia |
21:12 | Break! |
3 Third session
21:45 | NIST announcements: PQC, LWC, TDEA, 56A/C, and Beacon | Cryptographic Technologies Group |
21:52 | Notes on ``Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it | Tomer Ashur |
21:56 | Test of Time Award for the best Rump Session Presentation! | Orr Dunkelman |
22:01 | Delegatable Anonymous Credentials from Mercurial Signatures | Elizabeth Crites; Anna Lysyanskaya |
22:05 | Learning the One-Time Pad algorithm with Chosen-Plaintext Attack Adversarial Neural Cryptography | Murilo Coutinho Silva |
22:09 | From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness | Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka |
22:13 | Implementing Provably Secure Detection of Direct Injection Attack | Yun Lu; Konstantinos Mitropoulos; Ashwini Nene; Rafail Ostrovsky; Avi Weinstock; Vassilis Zikas |
22:17 | Separable Statistics, New Extension to Linear Cryptanalysis | Stian Fauskanger; Igor Semaev |
22:21 | Security and Composition of Rational Cryptographic Protocols | Ira Globus-Harris; Adam Groce; Palak Jain; Mark Schultz; Vassilis Zikas |
22:25 | Good night! |
4 Announcemnts
Shown during the breaks:
21st Workshop on Elliptic Curve Cryptography – ECC 2017 | Peter Schwabe |
CHES 2017 | Peter Schwabe |
Summerschool on real-world crypto and privacy 2018 | Peter Schwabe |
Real World Crypto 2018 announcement | Thomas Ristenpart; Anja Lehmann |
PKC 2018 | Michel Abdalla; Ricardo Dahab |
Eurocrypt 2018 | Orr Dunkelman; Jesper Buus Nielsen; Vincent Rijmen |
Special Issue on Secure MPC | Daniele Venturi |
Visa Research is hiring Cryptographers! | Pratyay Mukherjee |
Research Job in London about secure speech processing | Jean-Jacques Quisquater |
Announcement - Post-Doc Positions | Aggelos Kiayias |