| 19:30 | Studying Experiences of Cryptographers via an RCT | Elisabeth Oswald and Marc Fischlin |
| 19:36 | Correcting our Security Proofs | Yvo Desmedt |
| 19:42 | Fair Secure Computation | Alptekin Küpçü |
| 19:48 | Fair Room Selection Protocols | Josh Benaloh |
| 19:55 | Tutte's Colossus Method Beginning of Modern Computation | Steven Meyer |
| 20:00 | Malicious Keccak | Pawel Morawiecki |
| 20:05 | Quantum Tunnels in Cryptography | Danilo Gligoroski and Simona Samardjiska |
| 20:09 | Fun with p and q | Ilya O Levin |
| 20:15 | Brokered ID -- a killer app for S2PC? | Luís T. A. N. Brandão, Nicolas Christin, George Danezis, and Anonymous |
| 20:21 | Update on 15.000 Euro PRINCE Cipher-breaking Challenge | Gregor Leander, Ventzi Nikov, Christian Rechberger and Vincent Rijmen |
| 20:26 | AEZ BBB | Gaëtan Leurent |
| BREAK | SOC | SOC Committee |
| BREAK | Security in Times of Surveillance | Tanja Lange |
| BREAK | TCC 2016 announcement | Tal Malkin and Eyal Kushilevitz |
| BREAK | IMA Cryptography and Coding | Jens Groth |
| BREAK | Royal Holloway, University of London PhD Positions | Kenny Paterson |
| BREAK | University College London PhD Position | Sarah Meiklejohn |
| 21:00 | Best Future Conference Award 2015 | Christina Brzuska and Marc Fischlin |
| 21:05 | Lower Bounds for Unconditionally Secure MPC | Ivan Bjerre Damgård, Jesper Buus Nielsen and Antigoni Polychroniadou |
| 21:09 | "Real Cryptographers don't use Obfuscation" | Hoeteck Wee |
| 21:14 | Limits on the Power of Indistinguishability Obfuscation and Functional Encryption | Gilad Asharov |
| 21:19 | The Simplest Protocol For Oblivious Transfer | Claudio Orlandi |
| 21:22 | Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes | Robert Tsenkov |
| 21:27 | WDL | François Morain |
| 21:32 | Cloud Compliant Secure Logging | Mehmet Tahir Sandikkaya, Tolga Ovatman, and Ali Emre Harmanci |
| 21:37 | Computation-Trace Indistinguishability Obfuscation and its Applications | Yu-Chi Chen, Sherman Chow, Kai-Min Chung, Russell Lai, Wei-Kai Lin, and Hong-Sheng Zhou |
| 21:44 | DDD - ECRYPT III: The Revenge of the Sick | Nigel P. Smart |
| 21:48 | Bio-Crypto | Ivan Bjerre Damgård |
| 21:55 | Closing | Senior Chairs |

