Wednesday 4th Jan
08.00 | Arrival and Registration | |
09.00 | RWC Committee |
Welcome |
Session 1: TLS Engineering |
Session Chair: Kenny Paterson | |
09.15 | Rich Salz |
Software engineering and OpenSSL is not an oxymoron |
09.40 | Thai Duong, Emilia Kasper and Quan Nguyen | Project Wycheproof - Scaling crypto testing |
09.55 | Jacob Abbott, Pratik Patel, Zheng Dong, Kevin Kane, David Cooper, Siyu Chen and L Jean Camp. | X.509 in Practice (It's worse than you think) |
10.20 | Quan Nguyen |
Is Crypto Software Safe Yet? |
10.35 | Break | |
Session 2: Crypto For Internet Protocols |
Session chair: Aggelos Kiayias | |
11.00 | Sharon Goldberg |
NSEC5: Provably Preventing DNSSEC Zone Enumeration |
11.30 | Daniel Franke |
Cryptographically Securing the Network Time Protocol |
Special Session: Levchin Prize for Real-World Cryptography |
||
11.55 | Award ceremony | |
12.20 | Lunch | |
Session 3: Quantum and Post-Quantum |
Session Chair: Dan Boneh | |
13.45 | Joppe Bos |
Security assessment of software security: A closer look at white-box cryptographic implementations |
14.15 | Rene Peralta |
NIST's Post-Quantum Cryptography Project |
14.35 | Tancrè Lepoint | Cryptographic Suite for Algebraic Lattices CRYSTAL |
15.05 | Break | |
Session 4: Post-Quantum Crypto |
Session Chair: Dan Boneh | |
15.45 | Valeria Nikolaenko | Practical post-quantum key exchange from both ideal and generic lattices |
16.15 | Michael Naehrig |
Supersingular Isogeny Diffie-Hellman |
Session 5: Embedded Crypto |
Session Chair: Lejla Batina | |
16.45 | Mike Hamburg |
The Strobe protocol framework |
17.10 | Patrick Longa |
FourQ based cryptography for high performance and low power applications |
17.40 | Reception |
Thursday 5th Jan
Session 6: MPC |
||
09.00 | Yehuda Lindell |
High-Throughput Secure 3PC for Semi-Honest and Malicious Adversaries - Breaking the Billion-Gate per Second Barrier |
09.15 | Ben Kreuter |
Secure Multiparty Computation at Google |
09.45 | Hervéhabanne, Jonathan Milgram, Emmanuel Prouff, Constance Morel, Aurée Phesso | Privacy-Preserving Classi?cation on Deep Neural Network |
10.00 | Break | |
Session 7: Applications and Lawsuits |
Session Chair: Dan Boneh | |
10.25 | Jon Millican |
Challenges of E2E Encryption in Facebook Messenger |
10.50 | Moti Yung |
Memories for Your Eyes Only |
11.20 | Mitch Stoltz |
DMCA |
Special Session: Lightning Talks |
Session Chair: Nigel Smart | |
11.50 | Adverts, Jobs, New Results (No slides) | |
12.30 | Lunch | |
Session 8: Key Exchange and Secure Messaging Protocols |
Session Chair: Kenny Paterson | |
13.45 | Trevor Perrin |
Message Encryption |
14.15 | Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila | A Formal Security Analysis of the Signal Messaging Protocol |
14.30 | Felix Gü, Britta Hale, Tibor Jager and Sebastian Lauer | 0-RTT Key Exchange with Full Forward Secrecy |
14.45 | Pierre-Alain Fouque, Cristina Onete and Benjamin Richard | Towards 5G Authenticated Key-Exchange: the security and privacy of the AKA Protocol |
15.00 | Break | |
Session 9: Passwords and Authentication |
Session Chair: Tom Ristenpart | |
15.40 | Hugo Krawczyk | Is Password InSecurity Inevitable? Cryptographic Enhancements to Password Protocols |
16.10 | Jeremiah Blocki, Joel Alwen and Krzysztof Pietrzak | Towards a Theory of Data-Independent Memory Hard Functions |
16.40 | Stefano Tessaro |
The memory-hardness of Scrypt |
17.10 | George Tankersley, Filippo Valsorda and Alex Davidson |
Solving the Cloudflare CAPTCHA |
17.30 |
End of Day 2 |
Session 10: Implementations |
Session Chair: Tom Shrimpton | |
09.00 | Evan Jeffrey |
|
09.30 | Laurent Simon |
Erasing secrets from RAM |
Session 11: TPMs and Chips | Session Chair: Tom Shrimpton | |
09.45 | Anja Lehmann | Direct Anonymous Attestation and TPM 2.0: Getting Provably-Secure Crypto into the Real-World |
10.10 | Helena Handschuh | DPA Resistance for Real People |
10.40 | Break | |
Session 12: Searching on Encrypted Data |
Session Chair: Kenny Paterson | |
11.05 | David Cash |
What Else is Revealed by Order-Revealing Encryption |
11.35 | Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart and Vitaly Shmatikov | Breaking Web Applications Built On Top of Encrypted Data |
12:00 | Raluca Ada Popa | Building web applications on top of encrypted data |
12.25 | Lunch | |
Session 13: TLS Attacks |
Session Chair: Tom Ristenpart | |
13.30 | David McGrew, Blake Anderson, Scott Fluhrer and Chris Shenefiel | PRNG Failures and TLS Vulnerabilities in the Wild |
13.55 | Olivier Levillain, Maxence Tury and Nicolas Vivet | Concerto: A Methodology Towards Reproducible Analyses of TLS Datasets |
14.10 | Eva Sarafianou, Dionysis Zindros and Aggelos Kiayias | Productizing TLS Attacks: The Rupture API |
14.25 | Break | |
Session 14: Blockchain |
Session Chair: Aggelos Kiayias | |
14.50 | Elaine Shi | Rethinking Internet-Scale Consensus |
15.20 | Pedro Moreno-Sanchez and Aniket Kate | Listening to and Silencing the Whispers of Ripple: Study and Solutions for Privacy in IOweYou Credit Networks |
15.45 | Elli Androulaki, Christian Cachin and Marko Vukolic | Cryptography and Protocols in Hyperledger Fabric |
16.10 | Dmitry Meshkov, Leonid Reyzin, Alexander Chepurnoy and Sasha Ivanov | Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies |
16.25 | Conference Closes |