|
Wednesday, Jan. 9, 2013
|
9:30am |
Welcome
Dan Boneh
|
9:45am |
Requirements for random number generators
[slides]
Jesse Walker (Intel)
|
10:15am |
The Challenges of Distributing Distributed Cryptography
[slides]
Ari Juels (RSA)
|
10:45am |
Juan Garay (AT&T Research)
|
11:15am |
Break
|
11:30am |
Cryptographic challenges in and around Tor
[slides]
Nick Mathewson (Tor)
|
12:00pm |
Practical Anonymous Subscriptions
[slides]
Jon Katz (U. Maryland)
|
12:30pm |
Lunch
|
1:45pm |
Instantiating Random Oracles
[slides]
Mihir Bellare (UCSD)
|
2:30pm |
Data Privacy Models in the Payment Industry
[slides]
Terence Spies (Voltage)
|
3:00pm |
Break
|
3:15pm |
Identity Mixer: From paper to pilots and beyond
[slides]
Gregory Neven (IBM Zurich)
|
3:45pm |
CryptDB: Protecting Confidentiality with Encrypted Query Processing
[slides]
Raluca Ada Popa (MIT)
|
4:30pm |
End of day 1
|
|
Thursday, Jan. 10, 2013
|
9:30am |
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
[slides]
Nadia Heninger (Microsoft)
|
10:00am |
JavaScript Cryptography and the Case Against Crypto Reductionism
[slides]
Ben Adida (Mozilla)
|
10:30am |
Break
|
10:45am |
Counter-cryptanalysis: analyzing Flame's new collision attack
[slides]
Marc Stevens (CWI)
|
11:30am |
Multi Party Computation: From Theory to Practice
[slides]
Nigel Smart (Bristol)
|
12:15pm |
Lunch
|
1:45pm |
The Evolution of Authenticated Encryption
[slides]
Phil Rogaway (UC.Davis)
|
2:30pm |
EMV Proposals for Key Establishment
Kim Wagner (Visa)
|
3:00pm |
The low-call diet: Authenticated Encryption for call counting HSM users
[slides]
Gaven Watson (Bristol)
|
3:30pm |
Break
|
3:45pm |
HTTPS: things that bit us, things we fixed and things that are waiting in the grass
[slides]
Adam Langley (Google)
|
4:30pm |
Rebuilding the airplane in flight
Eric Rescorla
|
5:00pm |
End of day 2
|
|
Friday, Jan. 11, 2013
|
9:30am |
AES-GCM for Efficient Authenticated Encryption - Ending the Reign of HMAC-SHA-1?
[slides]
Shay Gueron (University of Haifa and Intel Corporation)
|
10:00am |
On the Security of the TLS and DTLS Record Protocols
[slides]
Kenny Paterson (Royal Holloway)
|
10:30am |
Enforcing honesty of certification authorities: Tagged one-time signature schemes
[slides]
Bertram Poettering (Royal Holloway)
|
11:00am |
Break
|
11:15am |
The Difference Between a Killer Deal and a Deal Killer
[slides]
Markus Jakobsson (PayPal)
|
12:00pm |
Lunch
|
1:15pm |
Transparency, Trust Agility, Pinning: Recent Developments in Server Authentication
[slides]
Trevor Perrin (Consultant)
|
2:00pm |
Real world SSL: the most dangerous code in the world
[slides]
Dan Boneh (Stanford)
|
2:30pm |
How much crypto in one microJoule?
[slides]
Ingrid Verbauwhede (UCLA)
|
3:00pm |
Break
|
3:15pm |
Exploiting weak randomness in web applications
[slides]
Aggelos Kiayias (U.Conn)
|
3:45pm |
Message-locked Encryption and Secure Deduplication
[slides]
Tom Ristenpart (U.W.Madison)
|
4:15pm |
Workshop end
|