Wednesday 4th Jan
| 08.00 | Arrival and Registration | |
| 09.00 | RWC Committee |
Welcome |
| Session 1: TLS Engineering |
Session Chair: Kenny Paterson | |
| 09.15 | Rich Salz |
Software engineering and OpenSSL is not an oxymoron |
| 09.40 | Thai Duong, Emilia Kasper and Quan Nguyen | Project Wycheproof - Scaling crypto testing |
| 09.55 | Jacob Abbott, Pratik Patel, Zheng Dong, Kevin Kane, David Cooper, Siyu Chen and L Jean Camp. | X.509 in Practice (It's worse than you think) |
| 10.20 | Quan Nguyen |
Is Crypto Software Safe Yet? |
| 10.35 | Break | |
| Session 2: Crypto For Internet Protocols |
Session chair: Aggelos Kiayias | |
| 11.00 | Sharon Goldberg |
NSEC5: Provably Preventing DNSSEC Zone Enumeration |
| 11.30 | Daniel Franke |
Cryptographically Securing the Network Time Protocol |
| Special Session: Levchin Prize for Real-World Cryptography |
||
| 11.55 | Award ceremony | |
| 12.20 | Lunch | |
| Session 3: Quantum and Post-Quantum |
Session Chair: Dan Boneh | |
| 13.45 | Joppe Bos |
Security assessment of software security: A closer look at white-box cryptographic implementations |
| 14.15 | Rene Peralta |
NIST's Post-Quantum Cryptography Project |
| 14.35 | Tancrè Lepoint | Cryptographic Suite for Algebraic Lattices CRYSTAL |
| 15.05 | Break | |
| Session 4: Post-Quantum Crypto |
Session Chair: Dan Boneh | |
| 15.45 | Valeria Nikolaenko | Practical post-quantum key exchange from both ideal and generic lattices |
| 16.15 | Michael Naehrig |
Supersingular Isogeny Diffie-Hellman |
| Session 5: Embedded Crypto |
Session Chair: Lejla Batina | |
| 16.45 | Mike Hamburg |
The Strobe protocol framework |
| 17.10 | Patrick Longa |
FourQ based cryptography for high performance and low power applications |
| 17.40 | Reception |
Thursday 5th Jan
| Session 6: MPC |
||
| 09.00 | Yehuda Lindell |
High-Throughput Secure 3PC for Semi-Honest and Malicious Adversaries - Breaking the Billion-Gate per Second Barrier |
| 09.15 | Ben Kreuter |
Secure Multiparty Computation at Google |
| 09.45 | Hervéhabanne, Jonathan Milgram, Emmanuel Prouff, Constance Morel, Aurée Phesso | Privacy-Preserving Classi?cation on Deep Neural Network |
| 10.00 | Break | |
| Session 7: Applications and Lawsuits |
Session Chair: Dan Boneh | |
| 10.25 | Jon Millican |
Challenges of E2E Encryption in Facebook Messenger |
| 10.50 | Moti Yung |
Memories for Your Eyes Only |
| 11.20 | Mitch Stoltz |
DMCA |
| Special Session: Lightning Talks |
Session Chair: Nigel Smart | |
| 11.50 | Adverts, Jobs, New Results (No slides) | |
| 12.30 | Lunch | |
| Session 8: Key Exchange and Secure Messaging Protocols |
Session Chair: Kenny Paterson | |
| 13.45 | Trevor Perrin |
Message Encryption |
| 14.15 | Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila | A Formal Security Analysis of the Signal Messaging Protocol |
| 14.30 | Felix Gü, Britta Hale, Tibor Jager and Sebastian Lauer | 0-RTT Key Exchange with Full Forward Secrecy |
| 14.45 | Pierre-Alain Fouque, Cristina Onete and Benjamin Richard | Towards 5G Authenticated Key-Exchange: the security and privacy of the AKA Protocol |
| 15.00 | Break | |
| Session 9: Passwords and Authentication |
Session Chair: Tom Ristenpart | |
| 15.40 | Hugo Krawczyk | Is Password InSecurity Inevitable? Cryptographic Enhancements to Password Protocols |
| 16.10 | Jeremiah Blocki, Joel Alwen and Krzysztof Pietrzak | Towards a Theory of Data-Independent Memory Hard Functions |
| 16.40 | Stefano Tessaro |
The memory-hardness of Scrypt |
| 17.10 | George Tankersley, Filippo Valsorda and Alex Davidson |
Solving the Cloudflare CAPTCHA |
| 17.30 |
End of Day 2 |
| Session 10: Implementations |
Session Chair: Tom Shrimpton | |
| 09.00 | Evan Jeffrey |
|
| 09.30 | Laurent Simon |
Erasing secrets from RAM |
| Session 11: TPMs and Chips | Session Chair: Tom Shrimpton | |
| 09.45 | Anja Lehmann | Direct Anonymous Attestation and TPM 2.0: Getting Provably-Secure Crypto into the Real-World |
| 10.10 | Helena Handschuh | DPA Resistance for Real People |
| 10.40 | Break | |
| Session 12: Searching on Encrypted Data |
Session Chair: Kenny Paterson | |
| 11.05 | David Cash |
What Else is Revealed by Order-Revealing Encryption |
| 11.35 | Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart and Vitaly Shmatikov | Breaking Web Applications Built On Top of Encrypted Data |
| 12:00 | Raluca Ada Popa | Building web applications on top of encrypted data |
| 12.25 | Lunch | |
| Session 13: TLS Attacks |
Session Chair: Tom Ristenpart | |
| 13.30 | David McGrew, Blake Anderson, Scott Fluhrer and Chris Shenefiel | PRNG Failures and TLS Vulnerabilities in the Wild |
| 13.55 | Olivier Levillain, Maxence Tury and Nicolas Vivet | Concerto: A Methodology Towards Reproducible Analyses of TLS Datasets |
| 14.10 | Eva Sarafianou, Dionysis Zindros and Aggelos Kiayias | Productizing TLS Attacks: The Rupture API |
| 14.25 | Break | |
| Session 14: Blockchain |
Session Chair: Aggelos Kiayias | |
| 14.50 | Elaine Shi | Rethinking Internet-Scale Consensus |
| 15.20 | Pedro Moreno-Sanchez and Aniket Kate | Listening to and Silencing the Whispers of Ripple: Study and Solutions for Privacy in IOweYou Credit Networks |
| 15.45 | Elli Androulaki, Christian Cachin and Marko Vukolic | Cryptography and Protocols in Hyperledger Fabric |
| 16.10 | Dmitry Meshkov, Leonid Reyzin, Alexander Chepurnoy and Sasha Ivanov | Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies |
| 16.25 | Conference Closes |