Cryptography and Information Security (CIS) Seminar

Aloni Cohen: Publicly Verifiable Software Watermarking
Friday, May 15, 2015 - 10:30am to 12:00pm

Abstract: Software Watermarking is the process of transforming a program into a functionally equivalent “marked” program in such a way that it is computationally hard to remove the mark without destroying functionality.

Mark Zhandry: Order-Revealing Encryption and the Hardness of Private Learning
Friday, May 8, 2015 - 10:30am to 12:00pm
Justin Holmgren: Succinctly Garbling and Obfuscating RAM programs
Friday, May 1, 2015 - 10:30am to 12:00pm
Abstract: 
Program obfuscation, and in particular the notion of Indistinguishability Obfuscation (IO) has
Ben Fisch: Physical Zero Knowledge and Secure Computation
Friday, March 6, 2015 - 10:30am to 12:00pm

Abstract: Is it possible to prove that two DNA-fingerprints match, or that they do not match, without revealing any further information about the fingerprints? Is it possible to prove that two objects have the same design without revealing the design itself?

Ranjit Kumaresan: How to Use Bitcoin to Design Fair Protocols
Friday, March 13, 2015 - 10:30am to 12:00pm
Abstract:
We study a model of fairness in secure computation in which an adversarial party that 
aborts on receiving output is forced to pay a mutually predefined monetary penalty. We 
Silas Richelson: Topology-Hiding Computation
Friday, February 13, 2015 - 10:30am to 12:00pm

Abstract: 

Vanishree Rao: Adaptive Multiparty Non-Interactive Key Exchange without Setup in the Standard Model
Friday, January 23, 2015 - 10:30am to 12:00pm

Abstract: Non-interactive key exchange (NIKE) is a fundamental notion in Cryptography. This notion was introduced by Diffie and Hellman in 1976.

Raphael Bost: Machine Learning Classification over Encrypted Data
Friday, February 6, 2015 - 10:30am to 12:00pm

Abstract:  Machine learning classification is used in numerous settings nowadays, such as medical or genomics predictions, spam detection, face recognition, and financial predictions.

Breaking a real life signature scheme with only 20 signature queries
Thursday, October 30, 2014 - 4:00pm to 5:30pm

Abstract: I will discuss recent joint work with Uni. Adelaide on
applying the Flush+Reload side channel to the OpenSSL implementation
of EC-DSA. The attacks require side-channel analysis as well as
the lattice based cryptanalysis of DSA nonces introduced by

Obfuscating Circuits via Composite-Order Graded Encoding
Friday, October 31, 2014 - 10:30am to 12:00pm
Abstract:
 

Pages

Subscribe to Cryptography and Information Security (CIS) Seminar