Program

Program

Wednesday 4th Jan

08.00 Arrival and Registration
09.00 RWC Committee
Welcome
Session 1: TLS Engineering
Session Chair: Kenny Paterson
09.15 Rich Salz
Software engineering and OpenSSL is not an oxymoron
09.40 Thai Duong, Emilia Kasper and Quan Nguyen Project Wycheproof - Scaling crypto testing
09.55 Jacob Abbott, Pratik Patel, Zheng Dong, Kevin Kane, David Cooper, Siyu Chen and L Jean Camp. X.509 in Practice (It's worse than you think)
10.20 Quan Nguyen
Is Crypto Software Safe Yet?
10.35 Break
Session 2: Crypto For Internet Protocols
Session chair: Aggelos Kiayias
11.00 Sharon Goldberg
NSEC5: Provably Preventing DNSSEC Zone Enumeration
11.30 Daniel Franke
Cryptographically Securing the Network Time Protocol
Special Session: Levchin Prize for Real-World Cryptography
11.55 Award ceremony
12.20 Lunch
Session 3: Quantum and Post-Quantum
Session Chair: Dan Boneh
13.45 Evan Jeffrey
Joppe Bos
The physics of building a quantum computer
Security assessment of software security: A closer look at white-box cryptographic implementations
14.15 Rene Peralta
NIST's Post-Quantum Cryptography Project
14.35 Tancrè Lepoint Cryptographic Suite for Algebraic Lattices — CRYSTAL
15.05 Break
Session 4: Post-Quantum Crypto
Session Chair: Dan Boneh
15.45 Valeria Nikolaenko Practical post-quantum key exchange from both ideal and generic lattices
16.15 Michael Naehrig
Supersingular Isogeny Diffie-Hellman
Session 5: Embedded Crypto
Session Chair: Lejla Batina
16.45 Mike Hamburg
The Strobe protocol framework
17.10 Patrick Longa
FourQ based cryptography for high performance and low power applications
17.40 Reception


Thursday 5th Jan

Session 6: MPC
09.00 Yehuda Lindell
High-Throughput Secure 3PC for Semi-Honest and Malicious Adversaries - Breaking the Billion-Gate per Second Barrier
09.15 Ben Kreuter
Secure Multiparty Computation at Google
09.45 Hervéhabanne, Jonathan Milgram, Emmanuel Prouff, Constance Morel, Aurée Phesso Privacy-Preserving Classi?cation on Deep Neural Network
10.00 Break
Session 7: Applications and Lawsuits
Session Chair: Dan Boneh
10.25 Jon Millican
Challenges of E2E Encryption in Facebook Messenger
10.50 Moti Yung
Memories for Your Eyes Only
11.20 Mitch Stoltz
DMCA
Special Session: Lightning Talks
Session Chair: Nigel Smart
11.50 Adverts, Jobs, New Results (No slides)
12.30 Lunch
Session 8: Key Exchange and Secure Messaging Protocols
Session Chair: Kenny Paterson
13.45 Trevor Perrin
Message Encryption
14.15 Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila A Formal Security Analysis of the Signal Messaging Protocol
14.30 Felix Gü, Britta Hale, Tibor Jager and Sebastian Lauer 0-RTT Key Exchange with Full Forward Secrecy
14.45 Pierre-Alain Fouque, Cristina Onete and Benjamin Richard Towards 5G Authenticated Key-Exchange: the security and privacy of the AKA Protocol
15.00 Break
Session 9: Passwords and Authentication
Session Chair: Tom Ristenpart
15.40 Hugo Krawczyk Is Password InSecurity Inevitable? Cryptographic Enhancements to Password Protocols
16.10 Jeremiah Blocki, Joel Alwen and Krzysztof Pietrzak Towards a Theory of Data-Independent Memory Hard Functions
16.40 Stefano Tessaro
The memory-hardness of Scrypt
17.10 George Tankersley, Filippo Valsorda and Alex Davidson
Solving the Cloudflare CAPTCHA
17.30
End of Day 2


Friday 6th Jan
Session 10: Implementations
Session Chair: Tom Shrimpton
09.00 Joppe Bos
Evan Jeffrey
Security assessment of software security: A closer look at white-box cryptographic implementations
The physics of building a quantum computer
09.30 Laurent Simon
Erasing secrets from RAM
Session 11: TPMs and Chips Session Chair: Tom Shrimpton
09.45 Anja Lehmann Direct Anonymous Attestation and TPM 2.0: Getting Provably-Secure Crypto into the Real-World
10.10 Helena Handschuh DPA Resistance for Real People
10.40 Break
Session 12: Searching on Encrypted Data
Session Chair: Kenny Paterson
11.05 David Cash
What Else is Revealed by Order-Revealing Encryption
11.35 Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart and Vitaly Shmatikov Breaking Web Applications Built On Top of Encrypted Data
12:00 Raluca Ada Popa Building web applications on top of encrypted data
12.25 Lunch
Session 13: TLS Attacks
Session Chair: Tom Ristenpart
13.30 David McGrew, Blake Anderson, Scott Fluhrer and Chris Shenefiel PRNG Failures and TLS Vulnerabilities in the Wild
13.55 Olivier Levillain, Maxence Tury and Nicolas Vivet Concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
14.10 Eva Sarafianou, Dionysis Zindros and Aggelos Kiayias Productizing TLS Attacks: The Rupture API
14.25 Break
Session 14: Blockchain
Session Chair: Aggelos Kiayias
14.50 Elaine Shi Rethinking Internet-Scale Consensus
15.20 Pedro Moreno-Sanchez and Aniket Kate Listening to and Silencing the Whispers of Ripple: Study and Solutions for Privacy in IOweYou Credit Networks
15.45 Elli Androulaki, Christian Cachin and Marko Vukolic Cryptography and Protocols in Hyperledger Fabric
16.10 Dmitry Meshkov, Leonid Reyzin, Alexander Chepurnoy and Sasha Ivanov Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
16.25 Conference Closes