Seminar series coordinated by Vinod Vaikuntanathan.

 If you are interested in giving a talk in this series, please contact Vinod, or any
 of the CIS faculty.  If you would would like to be on the mailing list for this
 seminar series, please contact Debbie Lehto,  dlehto (at sign) 
Spring 2017
February 17, 2017:  Charles River Crypto Day (MSR)
March 3, 2017: No Seminar -- Grad Visit Day
March 31, 2017:  MIT Spring Break
May 12, 2017: Charles River Crypto Day (BU)
May 19, 2017: Noah Stephens-Davidowitz: TBD
Fall 2016
September 9, 2016:  No Seminar (MACS PI Meeting)
September 23, 2016:  No Seminar (Theory Student Retreat)
October 14, 2016:  Charles River Crypto Day (Nir Bitansky, Rachel Lin, Jing Chen, Elaine Shi and Jeremiah Blocki)
November 18, 2016:  DOUBLE FEATURE (Lunch Provided)
    12:30 - 2:00:  Joseph Bonneau (Stanford): Public randomness, blockchains and proofs-of-delay
November 25, 2016:  MIT Holiday - Thanksgiving
December 9, 2016:  Charles River Crypto Day (Mike Rosulek, Leo Reyzin, Dana Dachman-Soled and Gillat Kol)
Spring 2016

February 5, 2016:  Daniel GenkinEfficient Multi-Party Computation: from Passive to Active Security using Additive-Attack Resilient Circuits

February 12, 2016:  Elette Boyle: New Developments in Function Secret Sharing

February 19, 2016:  Aloni Cohen:  GGM is a Weakly One-Way Family of Functions

February 26, 2016:  Crypto Day, MSR New England

March 11, 2016:  Adam Sealfon: Network Oblivious Transfer

March 18, 2016:  Jean-Jacques Quisquater: Quisquater: Is the Group Theory Fully Used for Cryptography

March 25, 2016: Spring Vacation

April 1, 2016:  Mark Zhandry:  Annihilation Attacks for Multilinear Maps:  Cryptanalysis of Indistinguishability Obfuscation over GGH13

April 7, 2016 (Special date and time) Joint with DCI: Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts

April 8, 2016:  Prashant Vasudevan: Fine-Grained Cryptography

April 15, 2016:  Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices

April 29, 2016:  Valerio Pastro: Essentially Optimal Robust Secret Sharing with Maximal Corruptions

May 6, 2016:  Rafael Pass:  Analysis of the Blockchain Protocol in Asynchronous Networks

May 13, 2016:  Ron Rothblum:  Spooky Encryption and its Application

May 17, 2016:  (Special Date, Time and Location) - Joel Alwen:  Data-Independent Memory Hard Functions

May 20, 2016:  Kobbi Nissim:  Accessing Data while Preserving Privacy

June 24, 2016:  Dakshita Khurana: Two-Message Non-Malleable Commitments

Fall 2015
October 2, 2015:  NSF MACS PI Meeting
November 27, 2015: No Seminer - Thanksgiving holiday

Spring 2015

January 23, 2015:  Vanishree Rao:  Adaptive Multiparty Non-Interactive Key Exchange without Setup in the Standard Model

January 30, 2015:  BU Hariri Center:  Oblivious RAM Day

February 6, 2015:  Raphael Bost: Machine Learning Classification over Encrypted Data

February 13, 2015:  Silas Richelson:  Topology-Hiding Computation

February 20, 2015:  Charles River Crypto Day, MSR

March 6, 2015:  Ben Fisch:  Physical Zero Knowledge and Secure Computation

March 13, 2015:  Ranjit Kumaresan:  How to Use Bitcoin to Design Fair Protocols

March 27, 2015: Spring Vacation

April 10, 2015:  Omer Paneth On Obfuscation with Random Oracles

April 17, 2015:  Charles River Crypto Day, Northeastern University

April 24, 2015:  Sergey Gorbunov:  Graph-Induced Multilinear Maps from Lattices

May 1, 2015:  Justin Holmgren: Succinctly Garbling and Obfuscating RAM programs

May 8, 2015:   Mark Zhandry:  Order-Revealing Encryption and the Hardness of Private Learning

May 15, 2015:  Aloni Cohen:  Publicly Verifiable Software Watermarking


Summer/Fall 2014

July 10, 2014: Manoj Prabhakaran: On the Communication Complexity of Secure Computation

July 11, 2014: Brent Waters: Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption

July 25, 2014: Elette Boyle: Large-Scale Secure Computation

October 31, 2014: Zvika Brakerski: Obfuscating Circuits via Composite-Order Graded Encoding

November 7, 2014:  Hoeteck Wee: Dual System Encryption via Predicate Encodings

November 14, 2014:  Daniel Wichs: On the Communication Complexity of Secure Function Evaluation with Long Output

November 21, 2014:   Joint CIS/TOC seminar: Antoine Joux 

November 28, 2014:   (Thanksgiving)

December 5, 2014:   Crypto Day, BU

December 12, 2014:   Benjamin Fuller: Strong Key Derivation from Noisy Sources





January 24, 2014: Alessandra Scafuro, UCLA: Black-box non-black-box zero-knowledge via extendable Merkle tree

January 31, 2014: Shai Halevi, IBM: Candidate Multilinear Maps from Ideal Lattices

February 7, 2014: Pavel Hubacek, University of Aarhus: Rational Arguments: Single Round Delegation with Sublinear Verification

February 14, 2014: No talk scheduled

February 21, 2014: Gilad Asharov, Bar-Ilan University: Towards Characterizing Complete Fairness in Secure Two-Party Computation

February 28, 2014: Itay Berman, Tel Aviv University: Coin Flipping of Any Constant Bias Implies One-Way Functions

March 7, 2014: Graduate Student Talk in 32-G882 2:30-5pm

March 14, 2014: No Talk

March 21, 2014: Daniel Wichs, Garbling and Outsourcing RAM Computation

March 28, 2014: Spring Break! No seminar

April 4, 2014: Adam Smith, Penn State: Regularity of Lossy Exponentiation and Applications

April 11, 2014: No Talk

April 14, 2014: Cancelled: Special Seminar with Ross Anderson: EMV: Why Payment Systems Fail

April 18, 2014: David Xiao: Redrawing the boundaries of purchasing data from privacy-sensitive individuals

April 25, 2014: Mark Zhandry: How to Avoid Obfuscation using Witness PRFs

May 1, 2014: Special Seminar with Shafi Goldwasser: The Cryptographic Lens 

May 2, 2014: Sergey Gorbunov: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

May 9, 2014: No Talk Scheduled

May 16, 2014: No Talk Scheduled

May 23, 2014: Moses Liskov: Modeling Diffie-Hellman Derivability for Automated Analysis

May 30, 2014: Alessandro Chiesa: TBA

June 6, 2014: Commencement: No Talk Scheduled

June 13, 2014: No Talk Scheduled

June 20, 2014: Theory Day


December 6, 2013: Guy Rothblum: Speaker- Guy Rothblum, MSR Silicon Valley, MIT Alum

November 22, 2013: Alessandro Chiesa: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge

November 8, 2013: Daniele Micciancio: An equational approach to secure multiparty computation

November 1, 2013: Kobbi Nissim: Private Approximations and Big Data

October 18, 2013: Adi Shamir: Dissection: A New Paradigm for Solving Bicomposite Search Problems

October 17, 2013: Amir Herzberg: SPECIAL SEMINAR! Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI

September 13, 2013: Moni Naor: Cryptography and Data Structures: A Match Made in Heaven


Historical CIS Seminar listing 2013-1995