8:30-8:55
Arrival and registration
8:55-9:00
Kenny Paterson (RHUL)
Session 1: Anonymity in Practice (Session chair: Nigel Smart)
9:00-9:45 (15 minutes extra for anonymity tutorial)
Roger Dingledine (Tor project)
9:45-10:15
SecureDrop: anonymous/secure communications for journalists and sources
Garrett Robinson and Yan Zhu (Freedom of the Press Foundation and Yahoo)
10:15-10:45
Break
Session 2: Lightning Talks (Session chair: Nigel Smart)
10:45-11:15
Announce your open positions, new results and new initiatives here.
Open to all, first-come, first-served session, 2 minutes maximum per speaker, no slides.
Please form an orderly queue by the stage if you want to speak in this session.
Session 3: Crypto without Errors, both Malicious and Benign (Session chair: Dan Boneh)
11:15-11:45
Error-prone cryptographic designs
Dan Bernstein (University of Illinois at Chicago and TU Eindhoven)
11:45-12:15
The EC_DRBG/VCAT review and overview of NIST processes
John Kelsey (NIST)
12:15-1:30
Lunch
Session 4: Virtual currencies and passwords (Session chair: Joseph Bonneau)
1:30-2:00
Virtual currencies: Obstacles and applications beyond currency
Sarah Meiklejohn (UCL)
2:00-2:30
Facebook: Password Hashing & Authentication
Alec Muffett (Facebook)
2:30-3:00
Arvind Mani (LinkedIn)
3:00-3:30
Break
Session 5: Privacy and the law (Session chair: Aggelos Kiayias)
3:30-4:00
In PETs we trust: Gaps between privacy enhancing technologies and information privacy law
Claudia Diaz (KU Leuven)
Session 6: Short Talks 1 (Session chair: Aggelos Kiayias)
4:00-4:20
The ISO Standardization Process of PLAID: A Cryptographers Perspective
Jean Paul Degabriele, Victoria Fehr, Marc Fischlin, Tommaso Gagliardoni, Felix Gü, Giorgia Azzurra Marson, Arno Mittelbach and Kenneth G. Paterson (TU Darmstadt and RHUL)
4:20-4:40
Cryptography is for Everyone: From W3C Web Cryptography API to Client-Encrypted Email and Back Again
Harry Halpin (W3C)
4:40-4:50
New Kid on the Block: CLINT: A Cryptographic Library for the INternet of Things
Michael Scott (CertiVox Labs)
4:50-5:00
One of our algorithms is missing: Crypto APIs in 2014
Graham Steel (Cryptosense)
6.00-9.00 Reception at hosted by UCL and Simply Secure. BMA House Tavistock Square, London WC1H 9JP
Session 7: Symmetric encryption (Session chair: Thomas Shrimpton)
9:00-9:45 (15 minutes extra for symmetric encryption tutorial)
Searching Encrypted Cloud Data: Case Study on Academia + Industry (Done Right)
Sasha Boldyreva (Georgia Tech)
9:45-10:15
Can encryption save the credit card? A decade of standards and implementation
Terence Spies (Voltage Security)
10:15-10:45
Authenticated encryption and the CAESAR competition
Elena Andreeva (K.U. Leuven)
10:45-11:15
Break
Session 8: MPC (Session chair: Charalampos Papamanthou)
11:15-11:45
Dan Bogdanov (Cybernetica)
11:45-12:15
Superfolding Circuits with Logic Synthesis
Farinaz Koushanfar (Rice University) and Ahmad Sadeghi (TU Darmstadt)
Try the nearbypeople application.
12:15-1:30
Lunch
Session 9: Secure Hardware / Side-channels (Session chair: Graham Steel)
1:30 - 2:00
The ins and outs of programming cryptography in smart cards
Pascal Paillier (CryptoExperts)
2:00 - 2:30
The Need for Speed: Applications of High Performance Computing in Side Channel Research
Elisabeth Oswald (University of Bristol)
2:30 - 3:00
Hardware Security Modules: What they are and why it's likely that you've used one today
Paul Hampton (SafeNet)
3:00-3:30
Break
Session 10: Short talks 2 (Session chair: Kenny Paterson)
3.30-3:50
Emilia Kasper (Google)
3:50-4:00
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
Joppe W. Bos, Craig Costello, Michael Naehrig and Douglas Stebila (NXP, Microsoft Research, and Queensland University of Technology)
4:00-4:10
Post-Snowden Elliptic Curve Cryptography
Joppe Bos, Craig Costello, Patrick Longa and Michael Naehrig (NXP and Microsoft Research)
4.30-7.00
Drinks reception and posters, Lower Foyer, New Academic Building, LSE (concurrent with EU COST Action meeting in lecture theatre).
Please bring along your posters, maximum A1 size, for display during the reception. Poster boards will be supplied.
Session 11: TLS Practicalities (Session chair: Nadia Heninger)
9:00-9:45 (15 extra minutes for TLS intro)
Triple Handshake: Can cryptography, formal methods, and applied security be friends?
Markulf Kohlweiss (Microsoft Research) and Karthik Bhargavan (INRIA)
9:45-10:15
Brian Sniffen (Akamai)
10:15-10:45
Break
Session 12: TLS Practicalities, cont. (Session chair: Brian LaMacchia)
10:45-11:15
Protecting Data in Untrusted Locations - An exercise in real-world threat modelling
Jan Schaumann (Twitter)
11:15-11:45
Nick Sullivan (CloudFlare)
11:45 - 12.15
Eric Rescorla (Mozilla)
12:15-1:30
Lunch
Session 13: Secure Communications Protocols (Session chair: Alex Dent)
1:30-2:00
Privacy-preserving presence protocols
Ian Goldberg (University of Waterloo)
2:00-2:30
Innovation in end-to-end encrypted communication tools
Joseph Bonneau (Princeton)
2:30-3.00
Break
Session 14: Short Talks 3 (Session chair: Thomas Ristenpart)
3:00-3:10
When Tor and Bitcoin meet each other
Alex Biryukov and Ivan Pustogarov (University of Luxembourg)
3:10-3:30
Lessons Learned from Implementing Privacy-Preserving Protocols for Smart Meters
Benessa Defend and Klaus Kursawe (ENCS)
3:30-3:50
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts
Matthias Hamann, Frederik Armknecht and Vasily Mikhalev (Universitat Mannheim)
3:50-4:10
Embedded Device Cryptography in the Field
Alex Kropivny (Wurldtech)
4:10-4:20
Towards Provably-Secure Optimizing Masking Compilers
Gilles Barthe, Sonia Belaï Françs Dupressoir, Pierre-Alain Fouque, Benjamin Gregoire and Pierre-Yves Strub (IMDEA Software Institute, ENS & Thales Communications and Security, Universite de Rennes and IUF, INRIA Sophia-Antipolis, IMDEA Software Institute)
4:20-4:30
Eric Rescorla (Mozilla)
4:30-4:35
Closing Remarks
4:35
Fin