Sophia Yakoubov: "Fuzzy Password-Authenticated Key Exchange" Friday, May 18, 2018 - 1:00pm to 2:00pm Abstract: |
|
Sophia Yakoubov: "Fuzzy Password-Authenticated Key Exchange" Friday, May 11, 2018 - 1:00pm to 2:00pm Abstract: |
|
Jack Doerner: ORAM for Secure Computation Friday, March 23, 2018 - 10:30am to 12:00pm |
|
Hayim Shaul: Scalable Secure Computation of Moments with Application to k-Nearest Neighbors Friday, March 9, 2018 - 10:30am to 12:00pm Abstract: Given a set S of n d-dimensional points, the k-nearest neighbors (kNN) is the problem of quickly finding k points in S that are nearest to a query point q. |
|
Rio LaVigne: Topology Hiding Computation for All Graphs Friday, March 2, 2018 - 10:30am to 12:00pm Abstract: |
|
Mukul Kulkarni: on-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering Friday, February 23, 2018 - 10:30am to 12:00pm Abstract:
|
|
Saleet Klein: The Edited Truth Friday, February 2, 2018 - 10:30am to 12:00pm Abstract: We introduce two new cryptographic notions in the realm of public and symmetric key encryption.
|
|
Yupeng Zhang: Verifiable Databases and RAM Programs Friday, February 9, 2018 - 10:30am to 12:00pm Abstract: The talk covers the following two papers:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
|
|
Xiao Wang: Authenticated Garbling: Efficient Maliciously Secure Two-Party Computation and Global-Scale Secure Multiparty Computation Friday, January 26, 2018 - 10:30am to 12:00pm Abstract: This talk consists of two papers:
== Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation ==
|
|
Peter Byerley rindal: Fast and Secure Private Set Intersection Friday, December 8, 2017 - 1:00pm to 2:30pm Abstract: |