Crypto 2017 Rump Schedule

1 First session

19:20 Program Chair's Report Jonathan Katz
19:26 Forty years and still running Jean-Jacques Quisquater et al
19:33 Blockchains and consensus protocols: Snake oil warning Christian Cachin
19:38 How (not) to pay with Bitcoin Matteo Campanelli; Rosario Gennaro; Luca Nizzardo; Steven Goldfeder
19:43 Proofs of Work for Blockchain Protocols Juan Garay; Aggelos Kiayias; Giorgos Panagiotakos
19:46 The history of blockchains with an application Jean-Jacques Quisquater
19:49 Top secret! A world of codes and ciphers: an exhibition Jean-Jacques Quisquater
19:52 Quantum Computing: Threat or Menace? Hilarie Orman; Paul Hoffman
19:55 The Sound of Quantum Michael Naehrig
     
19:59 Break!  

2 Second session

20:30 May the Fourth Be With You: A Microarchitectural Side Channel Attack on Real-World Applications of Curve25519 Daniel Genkin; Luke Valenta; Yuval Yarom
20:37 Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka
20:41 Lockable Obfuscation Rishab Goyal; Venkata Koppula; Brent Waters
20:45 Constraint Hiding Constrained PRFs for Any Circuit from Standard Lattice Assumptions Chris Peikert; Sina Shiehian
20:49 Real-world zkSNARKs: updates on Zcash, libsnark Eran Tromer; SCIPR Lab; Zerocash team
20:55 The JMAC MAC Pierre Karpman; Bart Mennink
20:58 Self-Correcting Random Oracles and Its Cliptographic Applications Alexander Russell; Qiang Tang; Moti Yung; Hong-Sheng Zhou
21:02 Browser Security with a Grain of Salt Daniel Genkin; Lev Pachmanov; Eran Tromer; Yuval Yarom
21:07 Report from ECC 2017 Brian LaMacchia
     
21:12 Break!  

3 Third session

21:45 NIST announcements: PQC, LWC, TDEA, 56A/C, and Beacon Cryptographic Technologies Group
21:52 Notes on ``Notes on the design and analysis of SIMON and SPECK'' and an Analysis of it Tomer Ashur
21:56 Test of Time Award for the best Rump Session Presentation! Orr Dunkelman
22:01 Delegatable Anonymous Credentials from Mercurial Signatures Elizabeth Crites; Anna Lysyanskaya
22:05 Learning the One-Time Pad algorithm with Chosen-Plaintext Attack Adversarial Neural Cryptography Murilo Coutinho Silva
22:09 From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka
22:13 Implementing Provably Secure Detection of Direct Injection Attack Yun Lu; Konstantinos Mitropoulos; Ashwini Nene; Rafail Ostrovsky; Avi Weinstock; Vassilis Zikas
22:17 Separable Statistics, New Extension to Linear Cryptanalysis Stian Fauskanger; Igor Semaev
22:21 Security and Composition of Rational Cryptographic Protocols Ira Globus-Harris; Adam Groce; Palak Jain; Mark Schultz; Vassilis Zikas
     
22:25 Good night!  

4 Announcemnts

Shown during the breaks:

21st Workshop on Elliptic Curve Cryptography – ECC 2017  Peter Schwabe
CHES 2017  Peter Schwabe
Summerschool on real-world crypto and privacy 2018  Peter Schwabe
Real World Crypto 2018 announcement  Thomas Ristenpart; Anja Lehmann
PKC 2018  Michel Abdalla; Ricardo Dahab
Eurocrypt 2018  Orr Dunkelman; Jesper Buus Nielsen; Vincent Rijmen
Special Issue on Secure MPC  Daniele Venturi
Visa Research is hiring Cryptographers!  Pratyay Mukherjee
Research Job in London about secure speech processing  Jean-Jacques Quisquater
Announcement - Post-Doc Positions  Aggelos Kiayias