Programme
Sunday, June 10th
17:00-19:00
Registration
Monday, June 11th
08.00-09.00
Registration
08.50-09.00
Welcome
Introductory Talks - Part I
09.00-10.00
Introduction to symmetric crypto – María Naya-Plasencia
10.00-10.30
Coffee break
10.30-11.30
(A brief, incomplete) Introduction to Authenticated Encryption – Tom Shrimpton
11.30-12.30
Introduction to public-key cryptography – Nadia Heninger
12.30-14.00
Lunch
14.00-15.30
Introduction to post-quantum cryptography and learning with errors – Douglas Stebila
15.30-16.00
Coffee Break
16.00-17.00
Introduction to elliptic curve cryptography – Craig Costello
19.00-21.00
Tuesday, June 12th
Introductory Talks - Part II
09.00-10.00
Introduction to microarchitectural attacks – Thomas Eisenbarth
10.00-10.30
Coffee break
10.30-11.30
Hardware-assisted security: From trust anchors to meltdown of trust – Ahmad-Reza Sadeghi
11.30-12.30
Proving Cryptographic Implementations Secure - Part I:
Interplay between cryptography and program verification – Manuel Barbosa
12.30-14.00
Lunch
14.00-15.00
Introduction to Privacy Enhancing Technologies – George Danezis
15.00-15.30
Coffee Break
15.30-16.30
Privacy-preserving information sharing: cryptographic tools and applications – Emiliano De Cristofaro
Lightning talks by students & postdocs
16.30-16.40
Sidechains – Dionysis Zindros
16.40-16.50
Compliance to RFC-7427 Signature Authentication in IKEv2 for Libreswan – Sahana Prasad
16.50-17.00
Analysis of pseudorandom sequences – Viktória Tóth and Viktória Fonyó
17.00-17.10
Special factorization method using complex multiplication on elliptic curves – Vladimír Sedláček
17.10-17.20
Trust is Risk – Orfeas Stefanos Thyfronitis Litos
Wednesday, June 13th
09:00-18:00
Thursday, June 14th
Distributed Ledgers I
Privacy I
09.00-10.00
Anonymity in cryptocurrencies through mixing services – Foteini Baldimtsi
Studying jerks on the Internet:
data-driven measurements of cyberbullying, hate, and misinformation –
Emiliano De Cristofaro
Hands-on Hardware Tutorial (09:00 - 12:30) – Nele Mentens
10.00-10.30
Coffee break
10.30-11.30
State channels and second-layer solutions – Andrew Miller
Tech Privacy and Safety in Intimate-Partner Violence – Tom Ristenpart
11.30-12.30
Programming Abstractions for Smart Contracts – Andrew Miller
Security and Privacy of P4 Medicine: Challenges and Possible Solutions – Jean-Pierre Hubaux
12.30-14.00
Lunch
Distributed Ledgers II
Real-world security (proofs)
14.00-15.00
(i) Quisquis: An Anonymous Cryptocurrency Based on Updatable Public Keys
(ii) Proofs of Replicated Storage Without Timing Assumptions – Claudio Orlandi
(ii) Proofs of Replicated Storage Without Timing Assumptions – Claudio Orlandi
Riscure Workshop (14:00 - 18:00) – Riscure
15.00-15.30
Coffee break
15.30-16.30
Everything you code can and
will be re-used against you: On run-time attacks and defenses – Ahmad-Reza Sadeghi
16.30-17.30
On the security and scalability of PoW-based blockchains – Ghassan Karame
(Partially Specified) Secure Channels – Tom Shrimpton
20.00
Friday, June 15th
Next-generation crypto primitves
Digital Surveillance & Password Authentication
09.00-10.00
Lightweight cryptography – María Naya-Plasencia
10.00-10.30
Coffee break
10.30-11.30
Fast Zero-Knowledge Proofs and Post-Quantum Signatures – Claudio Orlandi
Making Password Checking Systems Better – Tom Ristenpart
11.30-12.30
Supersingular isogenies in cryptography – Craig Costello
12.30-14.00
Lunch
Privacy and Identity
Attacks
14.00-15.00
Attribute-based identity management – Bart Jacobs
Side Channel Analysis – Thomas Eisenbarth
15.00-15.30
Coffee break
15.30-16.30
How not to generate random numbers – Nadia Heninger
16.30-17.30
Modern anonymous communications technologies – George Danezis
Provable security of
Internet cryptography protocols – Douglas Stebila
17.30-17.45
Farewell