Seminar series coordinated by Vinod Vaikuntanathan and Yael Kalai.

 If you are interested in giving a talk in this series, please contact Vinod or Yael, or any
 of the CIS faculty.  Please check the CIS seminar google calendar for availability.
If you would would like to be on the mailing list for this
 seminar series, please contact Debbie Goodwin,  dlehto (at sign) 
Spring 2020
There will be no CIS Seminar in spring 2020.
Fall 2019
October 4, 2019: Theory Student Retreat
November 1, 2019:   Crypto Day at MSR
November 29, 2019:  Thanksgiving Vacation
Spring 2019
January 15, 2019:  Ellete Boyle:  Compression Vector OLE and More
February 8, 2019: Cancelled To Be Rescheduled -  Nadia Heninger:  Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
March 1, 2019:  EECS Visit Day
March 8, 2019:  Crypto Day at MIT
March 29, 2019:  Spring Vacation
May 10, 2019:  Willy Quach
Fall 2018
September 21, 2018:  Student Holiday
November 23, 2018:  Thanksgiving Holiday
December 7, 2018:  MACS Meeting, No Seminar
December 14, 2018:  Crypto Day at BU
Spring 2018
March 16, 2018: Homomorphic Encryption Standardization Workshop at MIT (Kiva)
March 30, 2018: MIT Spring Break
April 6, 2018: FOCS deadline, no seminar.
May 4, 2018: Graduating Bits, No Seminar
May 18, 2018: (Double Header - Lunch Provided)
Fall 2017
September 22, 2017: Akshay Degwekar: From Laconic Zero Knowledge to Public Key Cryptography
September 29, 2017: Tianren Liu: Towards Breaking the Exponential Barrier for General Secret Sharing
October 6, 2017: Prabhanjan Ananth: A New Approach to Round-Optimal Secure Multiparty Computation
October 13, 2017: Sam Kim: Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
November 9, 2017: CRYPTO DAY at BU.
December 8, 2017: DOUBLE FEATURE (Lunch provided) 
December 15, 2017: CRYPTO DAY AT NEU.
Summer 2017
Spring 2017
February 17, 2017:  Charles River Crypto Day (MSR)
March 3, 2017: No Seminar -- Grad Visit Day
March 31, 2017:  MIT Spring Break
May 12, 2017: Charles River Crypto Day (BU)
Fall 2016
September 9, 2016:  No Seminar (MACS PI Meeting)
September 23, 2016:  No Seminar (Theory Student Retreat)
October 14, 2016:  Charles River Crypto Day (Nir Bitansky, Rachel Lin, Jing Chen, Elaine Shi and Jeremiah Blocki)
November 18, 2016:  DOUBLE FEATURE (Lunch Provided)
    12:30 - 2:00:  Joseph Bonneau (Stanford): Public randomness, blockchains and proofs-of-delay
November 25, 2016:  MIT Holiday - Thanksgiving
December 9, 2016:  Charles River Crypto Day (Mike Rosulek, Leo Reyzin, Dana Dachman-Soled and Gillat Kol)
Spring 2016

February 5, 2016:  Daniel GenkinEfficient Multi-Party Computation: from Passive to Active Security using Additive-Attack Resilient Circuits

February 12, 2016:  Elette Boyle: New Developments in Function Secret Sharing

February 19, 2016:  Aloni Cohen:  GGM is a Weakly One-Way Family of Functions

February 26, 2016:  Crypto Day, MSR New England

March 11, 2016:  Adam Sealfon: Network Oblivious Transfer

March 18, 2016:  Jean-Jacques Quisquater: Quisquater: Is the Group Theory Fully Used for Cryptography

March 25, 2016: Spring Vacation

April 1, 2016:  Mark Zhandry:  Annihilation Attacks for Multilinear Maps:  Cryptanalysis of Indistinguishability Obfuscation over GGH13

April 7, 2016 (Special date and time) Joint with DCI: Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts

April 8, 2016:  Prashant Vasudevan: Fine-Grained Cryptography

April 15, 2016:  Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices

April 29, 2016:  Valerio Pastro: Essentially Optimal Robust Secret Sharing with Maximal Corruptions

May 6, 2016:  Rafael Pass:  Analysis of the Blockchain Protocol in Asynchronous Networks

May 13, 2016:  Ron Rothblum:  Spooky Encryption and its Application

May 17, 2016:  (Special Date, Time and Location) - Joel Alwen:  Data-Independent Memory Hard Functions

May 20, 2016:  Kobbi Nissim:  Accessing Data while Preserving Privacy

June 24, 2016:  Dakshita Khurana: Two-Message Non-Malleable Commitments

Fall 2015
October 2, 2015:  NSF MACS PI Meeting
November 27, 2015: No Seminer - Thanksgiving holiday

Spring 2015

January 23, 2015:  Vanishree Rao:  Adaptive Multiparty Non-Interactive Key Exchange without Setup in the Standard Model

January 30, 2015:  BU Hariri Center:  Oblivious RAM Day

February 6, 2015:  Raphael Bost: Machine Learning Classification over Encrypted Data

February 13, 2015:  Silas Richelson:  Topology-Hiding Computation

February 20, 2015:  Charles River Crypto Day, MSR

March 6, 2015:  Ben Fisch:  Physical Zero Knowledge and Secure Computation

March 13, 2015:  Ranjit Kumaresan:  How to Use Bitcoin to Design Fair Protocols

March 27, 2015: Spring Vacation

April 10, 2015:  Omer Paneth On Obfuscation with Random Oracles

April 17, 2015:  Charles River Crypto Day, Northeastern University

April 24, 2015:  Sergey Gorbunov:  Graph-Induced Multilinear Maps from Lattices

May 1, 2015:  Justin Holmgren: Succinctly Garbling and Obfuscating RAM programs

May 8, 2015:   Mark Zhandry:  Order-Revealing Encryption and the Hardness of Private Learning

May 15, 2015:  Aloni Cohen:  Publicly Verifiable Software Watermarking


Summer/Fall 2014

July 10, 2014: Manoj Prabhakaran: On the Communication Complexity of Secure Computation

July 11, 2014: Brent Waters: Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption

July 25, 2014: Elette Boyle: Large-Scale Secure Computation

October 31, 2014: Zvika Brakerski: Obfuscating Circuits via Composite-Order Graded Encoding

November 7, 2014:  Hoeteck Wee: Dual System Encryption via Predicate Encodings

November 14, 2014:  Daniel Wichs: On the Communication Complexity of Secure Function Evaluation with Long Output

November 21, 2014:   Joint CIS/TOC seminar: Antoine Joux 

November 28, 2014:   (Thanksgiving)

December 5, 2014:   Crypto Day, BU

December 12, 2014:   Benjamin Fuller: Strong Key Derivation from Noisy Sources





January 24, 2014: Alessandra Scafuro, UCLA: Black-box non-black-box zero-knowledge via extendable Merkle tree

January 31, 2014: Shai Halevi, IBM: Candidate Multilinear Maps from Ideal Lattices

February 7, 2014: Pavel Hubacek, University of Aarhus: Rational Arguments: Single Round Delegation with Sublinear Verification

February 14, 2014: No talk scheduled

February 21, 2014: Gilad Asharov, Bar-Ilan University: Towards Characterizing Complete Fairness in Secure Two-Party Computation

February 28, 2014: Itay Berman, Tel Aviv University: Coin Flipping of Any Constant Bias Implies One-Way Functions

March 7, 2014: Graduate Student Talk in 32-G882 2:30-5pm

March 14, 2014: No Talk

March 21, 2014: Daniel Wichs, Garbling and Outsourcing RAM Computation

March 28, 2014: Spring Break! No seminar

April 4, 2014: Adam Smith, Penn State: Regularity of Lossy Exponentiation and Applications

April 11, 2014: No Talk

April 14, 2014: Cancelled: Special Seminar with Ross Anderson: EMV: Why Payment Systems Fail

April 18, 2014: David Xiao: Redrawing the boundaries of purchasing data from privacy-sensitive individuals

April 25, 2014: Mark Zhandry: How to Avoid Obfuscation using Witness PRFs

May 1, 2014: Special Seminar with Shafi Goldwasser: The Cryptographic Lens 

May 2, 2014: Sergey Gorbunov: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

May 9, 2014: No Talk Scheduled

May 16, 2014: No Talk Scheduled

May 23, 2014: Moses Liskov: Modeling Diffie-Hellman Derivability for Automated Analysis

May 30, 2014: Alessandro Chiesa: TBA

June 6, 2014: Commencement: No Talk Scheduled

June 13, 2014: No Talk Scheduled

June 20, 2014: Theory Day


December 6, 2013: Guy Rothblum: Speaker- Guy Rothblum, MSR Silicon Valley, MIT Alum

November 22, 2013: Alessandro Chiesa: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge

November 8, 2013: Daniele Micciancio: An equational approach to secure multiparty computation

November 1, 2013: Kobbi Nissim: Private Approximations and Big Data

October 18, 2013: Adi Shamir: Dissection: A New Paradigm for Solving Bicomposite Search Problems

October 17, 2013: Amir Herzberg: SPECIAL SEMINAR! Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI

September 13, 2013: Moni Naor: Cryptography and Data Structures: A Match Made in Heaven


Historical CIS Seminar listing 2013-1995