To register for the workshop/see extra details please visit the main Workshop Page.
Hover over a title so as to obtain the abstract.
|Tuesday 31st Jan||Wednesday 1st Feb||Thursday 2nd Feb|
09.40-09.45 Welcome from John Toland (Director INI)
IBM Research, USA
Recent Advances in Computational Extractors
University of Wisconsin, Madison
Practice-Driven Cryptographic Theory
Privacy in Deniable Anonymous Concurrent Authentication with Setup is Impossible: Do we Care?
John Beric and Mike Ward
Mastercard International The practical application of cryptography to international card payments
Cars and Voting Machines: Embedded Systems in the Field
IBM Research, Zurich
Storage encryption and key management
University of Athens
Cryptography with Work-based Corruptions and the Combinatorics of Anonymity
From Cryptographer's Cryptography to Engineer's Crypto
Mathematical and practical security problems not directly related to cryptography
HSM Portal -- Practical Tools Built on Theory
Verificatum -- An efficient and provably secure mix-net
|12.30-13.30||Lunch @ Wolfson Court|
University College London
Efficient Verification of ElGamal Ciphertext Shuffles
Theory and practice for hash functions.
Key Exchange: Security Models and Automatic Analysis
Portland State University
A long answer to the simple question, "Is TLS provably secure?"
Ruhr University Bochum
Lessons Learned from Four Years of Implementation Attacks against Real-World Targets
Problems in Cryptographic Standards and Implementations
Analysis of Cryptographic Security APIs
Privacy for Smart Meters : From theory to running meter code
New Directions in Practice Driven Cryptography
Richard Horne/George French
Barclays and UK Cabinet Office/Barclays
Scaling Cryptographic Deployments.
|19.30||Conference Dinner @ Emmanuel College|
For those wanting another talk just before the Dinner at Emmanuel there is a talk in Cambridge at 17.30 on the 1st which people might be interested in