CRYPTOGRAPHY AND INFORMATION SECURITY (CIS) SEMINARS
Seminar series coordinated by Vinod Vaikuntanathan and Yael Kalai.
July 19, 2024: Maria Corte Real Santos (University College London): Post-quantum secure signature schemes from isogenies
August 16, 2024: Yevgeniy Dodis (New York University): Perpetual Encryption
Spring 2024
March 19, 2021: Jiayu Zhang: Succinct Blind Quantum Computation Using a Random Oracle
February 5, 2016: Daniel Genkin: Efficient Multi-Party Computation: from Passive to Active Security using Additive-Attack Resilient Circuits
February 12, 2016: Elette Boyle: New Developments in Function Secret Sharing
February 19, 2016: Aloni Cohen: GGM is a Weakly One-Way Family of Functions
February 26, 2016: Crypto Day, MSR New England
March 11, 2016: Adam Sealfon: Network Oblivious Transfer
March 18, 2016: Jean-Jacques Quisquater: Quisquater: Is the Group Theory Fully Used for Cryptography
March 25, 2016: Spring Vacation
April 1, 2016: Mark Zhandry: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
April 7, 2016 (Special date and time) Joint with DCI: Ari Juels: The Ring of Gyges: Understanding Criminal Smart Contracts
April 8, 2016: Prashant Vasudevan: Fine-Grained Cryptography
April 15, 2016: Daniel Genkin: Physical Side Channel Attacks on PCs and Mobile Devices
April 22, 2016: Prabhanjan Ananth: Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
April 29, 2016: Valerio Pastro: Essentially Optimal Robust Secret Sharing with Maximal Corruptions
May 6, 2016: Rafael Pass: Analysis of the Blockchain Protocol in Asynchronous Networks
May 13, 2016: Ron Rothblum: Spooky Encryption and its Application
May 17, 2016: (Special Date, Time and Location) - Joel Alwen: Data-Independent Memory Hard Functions
May 20, 2016: Kobbi Nissim: Accessing Data while Preserving Privacy
June 24, 2016: Dakshita Khurana: Two-Message Non-Malleable Commitments
Spring 2015
January 23, 2015: Vanishree Rao: Adaptive Multiparty Non-Interactive Key Exchange without Setup in the Standard Model
January 30, 2015: BU Hariri Center: Oblivious RAM Day
February 6, 2015: Raphael Bost: Machine Learning Classification over Encrypted Data
February 13, 2015: Silas Richelson: Topology-Hiding Computation
February 20, 2015: Charles River Crypto Day, MSR
March 6, 2015: Ben Fisch: Physical Zero Knowledge and Secure Computation
March 13, 2015: Ranjit Kumaresan: How to Use Bitcoin to Design Fair Protocols
March 27, 2015: Spring Vacation
April 10, 2015: Omer Paneth: On Obfuscation with Random Oracles
April 17, 2015: Charles River Crypto Day, Northeastern University
April 24, 2015: Sergey Gorbunov: Graph-Induced Multilinear Maps from Lattices
May 1, 2015: Justin Holmgren: Succinctly Garbling and Obfuscating RAM programs
May 8, 2015: Mark Zhandry: Order-Revealing Encryption and the Hardness of Private Learning
May 15, 2015: Aloni Cohen: Publicly Verifiable Software Watermarking
Summer/Fall 2014
July 10, 2014: Manoj Prabhakaran: On the Communication Complexity of Secure Computation
July 11, 2014: Brent Waters: Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
July 25, 2014: Elette Boyle: Large-Scale Secure Computation
September 3, 2014 (Special date and time): Boaz Barak: Sum of Squares Proofs and the Quest towards Optimal Algorithms
September 12, 2014: Mark Zhandry: Fully Secure Functional Encryption Without Obfuscation
September 19, 2014: No Classes
October 10, 2014: Sergey Gorbunov: New Advances in Functional Encryption
October 17, 2014: Nir Bitansky: On Virtual Grey Box Obfuscation for General Circuits
October 24, 2014: Charles River Crypto Day, MIT
October 30, 2014 (Special date and time): Nigel Smart: Breaking a real life signature scheme with only 20 signature queries
October 31, 2014: Zvika Brakerski: Obfuscating Circuits via Composite-Order Graded Encoding
November 7, 2014: Hoeteck Wee: Dual System Encryption via Predicate Encodings
November 14, 2014: Daniel Wichs: On the Communication Complexity of Secure Function Evaluation with Long Output
November 21, 2014: Joint CIS/TOC seminar: Antoine Joux
November 28, 2014: (Thanksgiving)
December 5, 2014: Crypto Day, BU
December 12, 2014: Benjamin Fuller: Strong Key Derivation from Noisy Sources
2014
January 24, 2014: Alessandra Scafuro, UCLA: Black-box non-black-box zero-knowledge via extendable Merkle tree
January 31, 2014: Shai Halevi, IBM: Candidate Multilinear Maps from Ideal Lattices
February 7, 2014: Pavel Hubacek, University of Aarhus: Rational Arguments: Single Round Delegation with Sublinear Verification
February 14, 2014: No talk scheduled
February 21, 2014: Gilad Asharov, Bar-Ilan University: Towards Characterizing Complete Fairness in Secure Two-Party Computation
February 28, 2014: Itay Berman, Tel Aviv University: Coin Flipping of Any Constant Bias Implies One-Way Functions
March 7, 2014: Graduate Student Talk in 32-G882 2:30-5pm
March 14, 2014: No Talk
March 21, 2014: Daniel Wichs, Garbling and Outsourcing RAM Computation
March 28, 2014: Spring Break! No seminar
April 4, 2014: Adam Smith, Penn State: Regularity of Lossy Exponentiation and Applications
April 11, 2014: No Talk
April 14, 2014: Cancelled: Special Seminar with Ross Anderson: EMV: Why Payment Systems Fail
April 18, 2014: David Xiao: Redrawing the boundaries of purchasing data from privacy-sensitive individuals
April 25, 2014: Mark Zhandry: How to Avoid Obfuscation using Witness PRFs
May 1, 2014: Special Seminar with Shafi Goldwasser: The Cryptographic Lens
May 2, 2014: Sergey Gorbunov: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
May 9, 2014: No Talk Scheduled
May 16, 2014: No Talk Scheduled
May 23, 2014: Moses Liskov: Modeling Diffie-Hellman Derivability for Automated Analysis
May 30, 2014: Alessandro Chiesa: TBA
June 6, 2014: Commencement: No Talk Scheduled
June 13, 2014: No Talk Scheduled
June 20, 2014: Theory Day
2013
December 6, 2013: Guy Rothblum: Speaker- Guy Rothblum, MSR Silicon Valley, MIT Alum
November 22, 2013: Alessandro Chiesa: SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge
November 8, 2013: Daniele Micciancio: An equational approach to secure multiparty computation
November 1, 2013: Kobbi Nissim: Private Approximations and Big Data
October 18, 2013: Adi Shamir: Dissection: A New Paradigm for Solving Bicomposite Search Problems
October 17, 2013: Amir Herzberg: SPECIAL SEMINAR! Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI
September 13, 2013: Moni Naor: Cryptography and Data Structures: A Match Made in Heaven
Historical CIS Seminar listing 2013-1995