8:00am | Arrival and Registration |
9:15am | Welcome |
Session 1: Cryptographic privacy (session chair: Nigel Smart) | |
9:30am | The Blackphone Jon Callas, Silent Circle |
10:00am | Cryptographic directions in Tor: past and future Nick Mathewson, The Tor Project |
10:20am | Anonize: An anonymous survey system Rafael Pass and Abhi Shelat |
10:40am | Break |
Session 2: Cryptographic implementations (session chair: Tom Ristenpart) | |
11:10am | Cryptography in AllJoyn, an Open Source Framework for IoT Greg Zaverucha, Microsoft |
11:40am | High-assurance Cryptography Joe Kiniry, Galois Inc. |
Session 3: Award ceremony (session chair: Dan Boneh) | |
12:00pm | The first Levchin prize for contributions to real-word cryptography |
12:20pm | Lunch |
Session 4: Mixing and voting (session chair: Aggelos Kiayias) | |
2:00pm | PrivaTegrity: online communication with strong privacy David Chaum |
2:30pm | Software vulnerabilities in the Brazilian voting machine Diego Aranha |
2:50pm | The State of the Law: 2016 Nate Cardozo, EFF |
3:20pm | Break |
Session 5: TLS and QUIC (session chair: Kenny Paterson) | |
3:50pm | QUIC Crypto Adam Langley, Google Inc. |
4:20pm | On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption Tibor Jager, Juraj Somorovsky and JöSchwenk |
4:40am | The State of Transport Security in the E-Mail Ecosystem Aaron Zauner |
4:50pm | Where the Wild Warnings Are: The TLS Story Adrienne Porter Felt, Google Inc. |
5:20pm | End of day 1 |
5:45pm | Reception |
9:30am | TLS 1.3: Real-World Design Constraints Eric Rescorla |
Session 6: Crypto currencies (session chair: Dan Boneh) | |
10:00am | Hawk: Privacy-Preserving Blockchain and Smart Contracts Andrew Miller |
10:20am | Provisions: Proofs of solvency for cryptocurrencies Gaby Dagher, Benedikt Büoseph Bonneau, Jeremy Clark, and Dan Boneh |
10:40am | Securing Bitcoin Wallets: A new DSA threshold signature scheme that is usable in the real world Steven Goldfeder, Rosario Gennaro and Arvind Narayanan |
11:00am | Break |
Session 7: Policy (session chair: Nigel Smart) | |
11:30am | The Speech, Privacy, and Technology Project Daniel Kahn Gillmor, ACLU |
12:00pm | Lightning talks (1-3 mins) |
12:30pm | Lunch |
Session 8: Backdoors and Passwords (session chair: Tom Shrimpton) | |
2:00pm | An Update on the Backdoor in Juniper's ScreenOS Stephen Checkoway, Shaanan Cohney, Matthew Green, Nadia Heninger, H. D. Moore, Willem Pinckaers, Eric Rescorla, Hovav Shacham, and Ralf-Philipp Weinmann |
2:20pm | Pass: Strengthening and Democratizing Enterprise Password Hardening Ari Juels, Cornell Tech |
2:50pm | Argon2 and Egalitarian Computing Dmitry Khovratovich and Alex Biryukov |
3:10pm | Cryptographic pitfalls Nicko von Someren |
3:30pm | Break |
Session 9: TLS (session chair: Aggelos Kiayias) | |
4:00pm | TLS at the scale of Facebook Scott Renfro, Facebook |
4:30pm | No More Downgrades: Protecting TLS from Legacy Crypto Karthikeyan Bhargavan, INRIA Paris |
4:50pm | The OPTLS Protocol and TLS 1.3 Hugo Krawczyk and Hoeteck Wee |
5:10pm | Automated Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication Cas Cremers, Marko Horvat, Sam Scott and Thyla van der Merwe |
5:30pm | End of day 2 |
Session 10: Hardware (session chair: Tom Ristenpart) | |
9:30am | Sealing and Attestation in Intel's Software Guard Extensions (SGX) Rebekeh Leslie Hurd, Intel Corporation |
9:50am | Intel's SGX Memory Encryption Engine Shay Gueron, Intel Corporation and The University of Haifa, Israel |
10:20pm | Practical Attacks on Real World Cryptographic Implementations Juraj Somorovsky |
10:40am | Break |
Session 11: Property-Preserving Encryption (session chair: Brian LaMacchia) | |
11:10am | On Deploying Property-Preserving Encryption Paul Grubbs |
11:30am | Inference Attacks on Property-Preserving Encrypted Databases Charles Wright, Portland State University |
12:00pm | Lunch |
Session 12: Crypto in the clouds (session chair: Kenny Paterson) | |
2:00pm | Cache Attacks on the Cloud Thomas Eisenbarth, WPI |
2:30am | Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward Vincent Bindschaedler, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang and Yan Huang |
2:50pm | Replacing Weary Crypto: Upgrading the I2P network with stronger primitives Antonio Stradivari |
3:10pm | Break |
Session 13: Analysis and attacks (session chair: Dan Boneh) | |
3:40pm | Securing Communication in Google Production Systems Phil MacKenzie |
4:10pm | An analysis of DSA and ECDSA without generic groups Manuel Fersch, Eike Kiltz and Bertram Poettering |
4:20pm | New developments in BREACH Dimitris Karakostas and Dionysis Zindros |
4:40pm | Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS Kenneth Paterson and Martin Albrecht |
5:00pm | Conference end |