Tancrede Lepoint: Using the Rényi Divergence Rather than the Statistical Distance in Lattice Crypto Friday, November 4, 2016  10:30am to 12:00pm Abstract: 

Zahra Jafargholi: Adaptive Security of Yao's Garbled Circuits Friday, August 5, 2016  10:30am to 12:00pm Abstract: 

Renen Perlman: LatticeBased Fully Dynamic MultiKey FHE with Short Ciphertexts Friday, August 26, 2016  10:30am to 12:00pm Abstract: A fully homomorphic encryption scheme (FHE) allows one to convert an encryption of a message into an encryption of some arbitrary function of that message, without compromising the secrecy of the encrypted message. 

Amit Sahai: State of the iO: where we stand in the quest for secure obfuscation Friday, July 15, 2016  10:30am to 12:00pm Abstract:


Ron Rivest: Symmetric Encryption via Keyrings and ECC Friday, July 15, 2016  1:00pm to 2:30pm Abstract:
We present a new scheme for implementing a "fuzzy vault", wherein
a message can be encrypted using a biometric (a set of features) or
a set of keywords (a keyring) as a symmetric encryption key. The 

Dakshita Khurana: TwoMessage NonMalleable Commitments Friday, June 24, 2016  10:30am to 12:00pm Abstract: We construct twomessage nonmalleable commitments with respect to opening in the standard model, assuming only onetoone oneway functions. 

Kobbi Nissim: Accessing Data while Preserving Privacy Friday, May 20, 2016  10:30am to 12:00pm Abstract: We initiate a formal study of the privacyefficiency tradeoff of secure database systems. Such systems allow storing data on a remote server and accessing it efficiently while maintaining the privacy of the stored data. 

Joel Alwen: DataIndependent Memory Hard Functions Tuesday, May 17, 2016  4:00pm to 5:00pm Abstract: 

Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks Friday, May 6, 2016  10:30am to 12:00pm Abstract: 

Ron Rothblum: Spooky Encryption and its Application Friday, May 13, 2016  10:30am to 12:00pm Abstract: Consider a setting where inputs x_1,...,x_n are encrypted under
independent public keys. Given the ciphertexts c_i =
Enc(pk_i,x_i), Alice outputs ciphertexts c'_1,...,c'_n that 