| 8:00am | Arrival and Registration |
| 9:15am | Welcome |
| Session 1: Cryptographic privacy (session chair: Nigel Smart) | |
| 9:30am | The Blackphone Jon Callas, Silent Circle |
| 10:00am | Cryptographic directions in Tor: past and future Nick Mathewson, The Tor Project |
| 10:20am | Anonize: An anonymous survey system Rafael Pass and Abhi Shelat |
| 10:40am | Break |
| Session 2: Cryptographic implementations (session chair: Tom Ristenpart) | |
| 11:10am | Cryptography in AllJoyn, an Open Source Framework for IoT Greg Zaverucha, Microsoft |
| 11:40am | High-assurance Cryptography Joe Kiniry, Galois Inc. |
| Session 3: Award ceremony (session chair: Dan Boneh) | |
| 12:00pm | The first Levchin prize for contributions to real-word cryptography |
| 12:20pm | Lunch |
| Session 4: Mixing and voting (session chair: Aggelos Kiayias) | |
| 2:00pm | PrivaTegrity: online communication with strong privacy David Chaum |
| 2:30pm | Software vulnerabilities in the Brazilian voting machine Diego Aranha |
| 2:50pm | The State of the Law: 2016 Nate Cardozo, EFF |
| 3:20pm | Break |
| Session 5: TLS and QUIC (session chair: Kenny Paterson) | |
| 3:50pm | QUIC Crypto Adam Langley, Google Inc. |
| 4:20pm | On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager, Juraj Somorovsky and JöSchwenk |
| 4:40am | The State of Transport Security in the E-Mail Ecosystem Aaron Zauner |
| 4:50pm | Where the Wild Warnings Are: The TLS Story Adrienne Porter Felt, Google Inc. |
| 5:20pm | End of day 1 |
| 5:45pm | Reception |
| 9:30am | TLS 1.3: Real-World Design Constraints Eric Rescorla |
| Session 6: Crypto currencies (session chair: Dan Boneh) | |
| 10:00am | Hawk: Privacy-Preserving Blockchain and Smart Contracts Andrew Miller |
| 10:20am | Provisions: Proofs of solvency for cryptocurrencies Gaby Dagher, Benedikt Büoseph Bonneau, Jeremy Clark, and Dan Boneh |
| 10:40am | Securing Bitcoin Wallets: A new DSA threshold signature scheme that is usable in the real world Steven Goldfeder, Rosario Gennaro and Arvind Narayanan |
| 11:00am | Break |
| Session 7: Policy (session chair: Nigel Smart) | |
| 11:30am | The Speech, Privacy, and Technology Project Daniel Kahn Gillmor, ACLU |
| 12:00pm | Lightning talks (1-3 mins) |
| 12:30pm | Lunch |
| Session 8: Backdoors and Passwords (session chair: Tom Shrimpton) | |
| 2:00pm | An Update on the Backdoor in Juniper's ScreenOS Stephen Checkoway, Shaanan Cohney, Matthew Green, Nadia Heninger, H. D. Moore, Willem Pinckaers, Eric Rescorla, Hovav Shacham, and Ralf-Philipp Weinmann |
| 2:20pm | Pass: Strengthening and Democratizing Enterprise Password Hardening Ari Juels, Cornell Tech |
| 2:50pm | Argon2 and Egalitarian Computing Dmitry Khovratovich and Alex Biryukov |
| 3:10pm | Cryptographic pitfalls Nicko von Someren |
| 3:30pm | Break |
| Session 9: TLS (session chair: Aggelos Kiayias) | |
| 4:00pm | TLS at the scale of Facebook Scott Renfro, Facebook |
| 4:30pm | No More Downgrades: Protecting TLS from Legacy Crypto Karthikeyan Bhargavan, INRIA Paris |
| 4:50pm | The OPTLS Protocol and TLS 1.3 Hugo Krawczyk and Hoeteck Wee |
| 5:10pm | Automated Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication Cas Cremers, Marko Horvat, Sam Scott and Thyla van der Merwe |
| 5:30pm | End of day 2 |
| Session 10: Hardware (session chair: Tom Ristenpart) | |
| 9:30am | Sealing and Attestation in Intel's Software Guard Extensions (SGX) Rebekeh Leslie Hurd, Intel Corporation |
| 9:50am | Intel's SGX Memory Encryption Engine Shay Gueron, Intel Corporation and The University of Haifa, Israel |
| 10:20pm | Practical Attacks on Real World Cryptographic Implementations Juraj Somorovsky |
| 10:40am | Break |
| Session 11: Property-Preserving Encryption (session chair: Brian LaMacchia) | |
| 11:10am | On Deploying Property-Preserving Encryption Paul Grubbs |
| 11:30am | Inference Attacks on Property-Preserving Encrypted Databases Charles Wright, Portland State University |
| 12:00pm | Lunch |
| Session 12: Crypto in the clouds (session chair: Kenny Paterson) | |
| 2:00pm | Cache Attacks on the Cloud Thomas Eisenbarth, WPI |
| 2:30am | Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang and Yan Huang |
| 2:50pm | Replacing Weary Crypto: Upgrading the I2P network with stronger primitives Antonio Stradivari |
| 3:10pm | Break |
| Session 13: Analysis and attacks (session chair: Dan Boneh) | |
| 3:40pm | Securing Communication in Google Production Systems Phil MacKenzie |
| 4:10pm | An analysis of DSA and ECDSA without generic groups Manuel Fersch, Eike Kiltz and Bertram Poettering |
| 4:20pm | New developments in BREACH Dimitris Karakostas and Dionysis Zindros |
| 4:40pm | Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS Kenneth Paterson and Martin Albrecht |
| 5:00pm | Conference end |