CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) SEMINARS

 

CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) SEMINARS

Seminar series coordinated by Vinod Vaikuntanathan and Yael Kalai.

 
The talks will be held at the Stata Center, G-882 (the Hewlett room) from 10:30-noon on Fridays.
 
If you are interested in giving a talk in this series, please contact Vinod or Yael.  Please check the CIS seminar google calendar for availability. If you would like to be on the mailing list for this seminar series, please contact Felicia Raton: fraton (at sign) mit (dot) edu.
 
 
Fall 2023
 
 
September 22, 2023: No seminar // Student Holiday.
 
 
Note: Non-standard time (2-5pm) and location (Patil/Kiva G-449). The talk consists of a theory colloquium (2-3pm) followed by a "deep dive" (3-5pm).
 
 
October 20, 2023: Crypto Day at MIT. Aayush Jain (CMU), Ji Luo (University of Washington), Hoeteck Wee (NTT Research), Tina Zhang (MIT). 
 
 
 
 
 
November 24, 2023: Thanksgiving.
 
 
December 8, 2023: Alex Lombardi (Princeton).
 
December 15, 2023: 
 
Summer 2023
 
 
Spring 2023
 
 
 
March 10, 2023: Crypto day at BU (Noga Amit, Jiahui Liu, James Bartusek) 
 
 
 
 
Fall 2022
 
 
 
 
 
 
 
Spring 2022
 
 
 
 
March 25, 2022: MIT Spring Break
 
 
 
Summer 2022
 
 
 
 
Fall 2021
 
September 10, 2021:  Hemanta Maji: Computational Hardness of Optimal Fair Computation

 
October 1, 2021:  No Seminar, Eurocrypt Deadline
 
 
October 15, 2021:  No Seminar.
 
 
 
 
 
November 26, 2021: Thanksgiving Break No Seminar
 


 
Spring 2021
 
 
February 12, 2021: Charles River Crypto Day
 
 
 
 
 
 
 
 
 
May 7, 2021: No Seminar MIT Holiday
 
 
 
 
Fall 2020
 
 
October 30, 2020: Daniel Wichs: Candidate Obfuscation via Oblivious LWE Sampling
 
 
November 27, 2020: Thanksgiving Break
 
2 Part Seminar:
 
Summer 2020
 
July 30 & 31, 2020: Charles River Crypto Day
 
 
 
Spring 2020
 
There will be no CIS Seminar in spring 2020.
 
Fall 2019
 
October 4, 2019: Theory Student Retreat
 
 
 
 
November 1, 2019:   Crypto Day at MSR
 
 
 
 
November 29, 2019:  Thanksgiving Vacation
 
 
 
 
 
 
 
 
Spring 2019
 
January 15, 2019:  Ellete Boyle:  Compression Vector OLE and More
 
February 8, 2019: Cancelled To Be Rescheduled -  Nadia Heninger:  Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
 
 
 
March 1, 2019:  EECS Visit Day
 
March 8, 2019:  Crypto Day at MIT
 
March 29, 2019:  Spring Vacation
 
 
 
May 10, 2019:  Willy Quach
 
 
 
Fall 2018
 
 
September 21, 2018:  Student Holiday
 
 
 
 
 
 
 
 
 
November 23, 2018:  Thanksgiving Holiday
 
 
December 7, 2018:  MACS Meeting, No Seminar
 
December 14, 2018:  Crypto Day at BU
 
 
Spring 2018
 
 
 
 
 
 
 
 
March 16, 2018: Homomorphic Encryption Standardization Workshop at MIT (Kiva)
 
 
March 30, 2018: MIT Spring Break
 
April 6, 2018: FOCS deadline, no seminar.
 
 
 
 
May 4, 2018: Graduating Bits, No Seminar
 
 
May 18, 2018: (Double Header - Lunch Provided)
 
 
Fall 2017
 
 
September 22, 2017: Akshay Degwekar: From Laconic Zero Knowledge to Public Key Cryptography
 
September 29, 2017: Tianren Liu: Towards Breaking the Exponential Barrier for General Secret Sharing
 
October 6, 2017: Prabhanjan Ananth: A New Approach to Round-Optimal Secure Multiparty Computation
 
October 13, 2017: Sam Kim: Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
 
 
November 9, 2017: CRYPTO DAY at BU.
 
 
 
December 8, 2017: DOUBLE FEATURE (Lunch provided) 
 
 
December 15, 2017: CRYPTO DAY AT NEU.
 
Summer 2017
 
 
Spring 2017
 
 
 
February 17, 2017:  Charles River Crypto Day (MSR)
 
March 3, 2017: No Seminar -- Grad Visit Day
 
 
 
 
March 31, 2017:  MIT Spring Break
 
 
 
 
 
May 12, 2017: Charles River Crypto Day (BU)
 
 
 
Fall 2016
 
September 9, 2016:  No Seminar (MACS PI Meeting)
 
September 23, 2016:  No Seminar (Theory Student Retreat)
 
 
October 14, 2016:  Charles River Crypto Day (Nir Bitansky, Rachel Lin, Jing Chen, Elaine Shi and Jeremiah Blocki)
 
 
 
 
 
November 18, 2016:  DOUBLE FEATURE (Lunch Provided)
 
 
    12:30 - 2:00:  Joseph Bonneau (Stanford): Public randomness, blockchains and proofs-of-delay
 
November 25, 2016:  MIT Holiday - Thanksgiving
 
 
December 9, 2016:  Charles River Crypto Day (Mike Rosulek, Leo Reyzin, Dana Dachman-Soled and Gillat Kol)
 
 
 
Spring 2016
 

February 5, 2016:  Daniel GenkinEfficient Multi-Party Computation: from Passive to Active Security using Additive-Attack Resilient Circuits

February 12, 2016:  Elette Boyle: New Developments in Function Secret Sharing

February 19, 2016:  Aloni Cohen:  GGM is a Weakly One-Way Family of Functions

February 26, 2016:  Crypto Day, MSR New England

March 11, 2016:  Adam Sealfon: Network Oblivious Transfer

March 18, 2016:  Jean-Jacques Quisquater: Quisquater: Is the Group Theory Fully Used for Cryptography

March 25, 2016: Spring Vacation

April 1, 2016:  Mark Zhandry:  Annihilation Attacks for Multilinear Maps:  Cryptanalysis of Indistinguishability Obfuscation over GGH13

April 7, 2016 (Special date and time) Joint with DCI: Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts

April 8, 2016:  Prashant Vasudevan: Fine-Grained Cryptography

April 15, 2016:  Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices

April 29, 2016:  Valerio Pastro: Essentially Optimal Robust Secret Sharing with Maximal Corruptions

May 6, 2016:  Rafael Pass:  Analysis of the Blockchain Protocol in Asynchronous Networks

May 13, 2016:  Ron Rothblum:  Spooky Encryption and its Application

May 17, 2016:  (Special Date, Time and Location) - Joel Alwen:  Data-Independent Memory Hard Functions

May 20, 2016:  Kobbi Nissim:  Accessing Data while Preserving Privacy

June 24, 2016:  Dakshita Khurana: Two-Message Non-Malleable Commitments

 
Fall 2015
 
 
 
October 2, 2015:  NSF MACS PI Meeting
 
 
 
 
 
 
 
November 27, 2015: No Seminer - Thanksgiving holiday
 
 
 
 
 
 

Spring 2015

January 23, 2015:  Vanishree Rao:  Adaptive Multiparty Non-Interactive Key Exchange without Setup in the Standard Model

January 30, 2015:  BU Hariri Center:  Oblivious RAM Day

February 6, 2015:  Raphael Bost: Machine Learning Classification over Encrypted Data

February 13, 2015:  Silas Richelson:  Topology-Hiding Computation

February 20, 2015:  Charles River Crypto Day, MSR

March 6, 2015:  Ben Fisch:  Physical Zero Knowledge and Secure Computation

March 13, 2015:  Ranjit Kumaresan:  How to Use Bitcoin to Design Fair Protocols

March 27, 2015: Spring Vacation

April 10, 2015:  Omer Paneth On Obfuscation with Random Oracles

April 17, 2015:  Charles River Crypto Day, Northeastern University

April 24, 2015:  Sergey Gorbunov:  Graph-Induced Multilinear Maps from Lattices

May 1, 2015:  Justin Holmgren: Succinctly Garbling and Obfuscating RAM programs

May 8, 2015:   Mark Zhandry:  Order-Revealing Encryption and the Hardness of Private Learning

May 15, 2015:  Aloni Cohen:  Publicly Verifiable Software Watermarking

 

Summer/Fall 2014

July 10, 2014: Manoj Prabhakaran: On the Communication Complexity of Secure Computation

July 11, 2014: Brent Waters: Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption

July 25, 2014: Elette Boyle: Large-Scale Secure Computation

October 31, 2014: Zvika Brakerski: Obfuscating Circuits via Composite-Order Graded Encoding

November 7, 2014:  Hoeteck Wee: Dual System Encryption via Predicate Encodings

November 14, 2014:  Daniel Wichs: On the Communication Complexity of Secure Function Evaluation with Long Output

November 21, 2014:   Joint CIS/TOC seminar: Antoine Joux 

November 28, 2014:   (Thanksgiving)

December 5, 2014:   Crypto Day, BU

December 12, 2014:   Benjamin Fuller: Strong Key Derivation from Noisy Sources

 

 

 

2014

January 24, 2014: Alessandra Scafuro, UCLA: Black-box non-black-box zero-knowledge via extendable Merkle tree

January 31, 2014: Shai Halevi, IBM: Candidate Multilinear Maps from Ideal Lattices

February 7, 2014: Pavel Hubacek, University of Aarhus: Rational Arguments: Single Round Delegation with Sublinear Verification

February 14, 2014: No talk scheduled

February 21, 2014: Gilad Asharov, Bar-Ilan University: Towards Characterizing Complete Fairness in Secure Two-Party Computation

February 28, 2014: Itay Berman, Tel Aviv University: Coin Flipping of Any Constant Bias Implies One-Way Functions

March 7, 2014: Graduate Student Talk in 32-G882 2:30-5pm

March 14, 2014: No Talk

March 21, 2014: Daniel Wichs, Garbling and Outsourcing RAM Computation

March 28, 2014: Spring Break! No seminar

April 4, 2014: Adam Smith, Penn State: Regularity of Lossy Exponentiation and Applications

April 11, 2014: No Talk

April 14, 2014: Cancelled: Special Seminar with Ross Anderson: EMV: Why Payment Systems Fail

April 18, 2014: David Xiao: Redrawing the boundaries of purchasing data from privacy-sensitive individuals

April 25, 2014: Mark Zhandry: How to Avoid Obfuscation using Witness PRFs

May 1, 2014: Special Seminar with Shafi Goldwasser: The Cryptographic Lens 

May 2, 2014: Sergey Gorbunov: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

May 9, 2014: No Talk Scheduled

May 16, 2014: No Talk Scheduled

May 23, 2014: Moses Liskov: Modeling Diffie-Hellman Derivability for Automated Analysis

May 30, 2014: Alessandro Chiesa: TBA

June 6, 2014: Commencement: No Talk Scheduled

June 13, 2014: No Talk Scheduled

June 20, 2014: Theory Day


2013

December 6, 2013: Guy Rothblum: Speaker- Guy Rothblum, MSR Silicon Valley, MIT Alum

November 22, 2013: Alessandro Chiesa: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge

November 8, 2013: Daniele Micciancio: An equational approach to secure multiparty computation

November 1, 2013: Kobbi Nissim: Private Approximations and Big Data

October 18, 2013: Adi Shamir: Dissection: A New Paradigm for Solving Bicomposite Search Problems

October 17, 2013: Amir Herzberg: SPECIAL SEMINAR! Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI

September 13, 2013: Moni Naor: Cryptography and Data Structures: A Match Made in Heaven

 

Historical CIS Seminar listing 2013-1995