Yevgeniy Dodis: Small-Box Cryptography Friday, October 19, 2018 - 10:30am to 12:00pm Abstract: |
|
Willy Quach: Laconic Function Evaluation and Applications Friday, October 5, 2018 - 10:30am to 12:00pm Abstract: We introduce a new cryptographic primitive called laconic function |
|
Aikaterini Sotiraki: PPP-Completeness with Connections to Cryptography Friday, September 28, 2018 - 10:30am to 12:00pm Abstract: PPP is an important subclass of TFNP with profound connections to the complexity of the fundamental cryptographic primitives: collision-resistant hash functions and one-way permutations. In contrast to most of the other subclasses |
|
Urmila Mahadev (Berkeley): Classical Homomorphic Encryption for Quantum Circuits Friday, October 26, 2018 - 10:30am to 12:00pm Abstract: We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys. |
|
Eylon Yogev (Weizmann Institute):On Distributional Collision Resistant Hashing Friday, September 14, 2018 - 10:30am to 12:00pm Abstract:
|
|
Merav Parter (Weizmann): Distributed Computing Made Secure: A New Cycle Cover Theorem Monday, June 18, 2018 - 1:30pm to 3:00pm |
|
Ran Cohen: Must the Communication Graph of MPC Protocols be an Expander? Friday, May 18, 2018 - 10:30am to 12:00pm Abstract: Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur dependent on its structure, and (2) Where edges in the |
|
Kevin Fu: Physics of Cybersecurity: Sensors, Acoustics, Cuba Friday, May 11, 2018 - 10:30am to 12:00pm Abstract: Medical devices, autonomous vehicles, and the Internet of Things depend on the integrity and availability of trustworthy data from sensors to make safety-critical, automated decisions. |
|
Adi Shamir: Towards Quantitative Analysis of Cyber Security Friday, April 27, 2018 - 10:30am to 12:00pm ABSTRACT: Cyber security had become an extremely hot topic in the last few years, but almost all the research results published so far had been qualitative in nature: they do not formulate a precise mathematical model of the problem, do not numerically compare |
|
Alex Lombardi (MIT): Cryptographic Hashing From Strong One-Way Functions Friday, April 13, 2018 - 10:30am to 12:00pm |