Before proceeding let's describe what our goals are (in no particular order):
Type  Date  Paper  Presenter  Blog Post 

G  1 October 2015 
Attacking and Fixing PKCS#11 Tokens 
Ryan  Link 
T  8 October 2015 
Provably Weak Instances of RingLWE 
Ana  Link 
P  29 October 2015 
The New South Wales iVote System: Security Failures and Verifications Flaws in a Live Online Election 
David  Link 
T  5 November 2015 
Secure MultiParty Computation with Identifiable Abort 
Peter  Link 
T  12 November 2015 
Deja Q: Using Dual Systems to Revisit qType Assumptions 
Saqib  Link 
T  26 November 2015 
Combining online learning and equilibrium computation in security games 
Chris  Link 
P  3 December 2015 
PeekaBoo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail 
Yan  Link 
T  17 December 2015 
BlackBox Garbled RAM 
Marcel  Link 
T  21 January 2016 
Cryptanalysis of the Multilinear Map over the Integers 
Srinivas  Link 
T  28 January 2016 
A Modular Framework for Building VariableInputLength Tweakable Ciphers 
Guy  Link 
G  4 February 2016 
Secure Deduplication of Encrypted Data without Additional Independent Servers 
Gareth  Link 
T  11 February 2016 
Proofs of Space / Spacecoin: A Cryptocurrency Based on Proofs of Space 
Sergiu  Link 
P  18 February 2016 
Side Channel Power Analysis of an AES256 Bootloader 
Jake  Link 
T  3 March 2016 
Cryptographic Reverse Firewalls 
Susan  Link 
G  10 March 2016 
A Personal View of AverageCase Complexity 
Dan  Link 
G  17 March 2016 
Leakage Assessment Methodology  a Clear Roadmap for SideChannel Evaluations 
Luke  Link 
G  24 March 2016 
The Moral Character of Cryptographic Work 
Carolyn  Link 
T  31 March 2016 
DuVote: Remote Electronic Voting with Untrusted Computers 
Guillaume  Link 
P  7 April 2016 
The Temperature Side Channel and Heating Fault Attacks 
Joey  Link 
T  14 April 2016 
Protecting Obfuscation Against Algebraic Attacks 
Tim  Link 
T  21 April 2016 
Robustness of the Learning with Errors Assumption 
Marco  Link 
T  28 April 2016 
Cryptography with OneWay Communication 
Emmanuela  Link 
Type  Date  Topic Title and Papers  Presenters  Blog Post and Author 

G  18 June 2015 
Near Collision Side Channel Attacks

Jake  Marcel 
P  11 June 2015 
Attacking PUFBased Pattern Matching Key Generators via Helper Data Manipulation

Marcin  Emmanuela 
G  4 June 2015 
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild

Luke  David McCann 
T  28 May 2015 
Breaking Soliloquy 
Ana  Ryan 
T  21 May 2015 
OneRound Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model

Bin  Susan 
G  14 May 2015 
A Gametheoretic Approach to Security and Power Conservation in Wireless Sensor Networks

Kostas  Marcin 
P  7 May 2015 
PixelVault: Using GPUs for Securing Cryptographic Operations

Jonathan  Ana 
T  23 Apr 2015 
Do You Know the Definition of INDCCA? 
Susan  Sergiu 
P  19 Mar 2015 
Soft Analytical SideChannel Attacks

Dan M  Carolyn 
T  05 Mar 2015 
S.H.I.E.L.D. 
Marcel  Peter 
G  19 Feb 2015 
Linearly Homomorphic Encryption from DDH

Chris  Guillaume 
G  26 Feb 2015 
"In Lieu of Swap: Analyzing Compressed RAM in Mac OS X and Linux"

George  Jonathan 
P  12 Feb 2015 
Attacking Suggest Boxes in Web Applications Over HTTPS Using SideChannel Stochastic Algorithms

Yan  Valentina 
T  05 Feb 2015 
Yet Another (Probably) Hard Problem with Neat Crypto Applications: 
Ryan  Dan M 
T  29 Jan 2015 
Solving the Shortest Vector Problem in 2^n Time via Discrete Gaussian Sampling

Joop  Carolyn 
T  11 Dec 2014 
XLS: Security, insecurity and consequences

Guy  Gareth 
P  4 Dec 2014 
Efficient Smart Phone Forensics Based on Relevance Feedback

Panos  Yan 
G  27 Nov 2014 
Security of Symmetric Encryption against Mass Surveillance

Gareth   
T  20 Nov 2014 
Practical hashbased signatures: Eliminating the state

Peter  Ryan 
G  13 Nov 2014 
Network Security Risk Assessment Using Bayesian Belief Networks

Shan  Chris 
T  13 Nov 2014 
Introduction to Formal Methods

Guillaume   
P  30 Oct 2014 
Simple Power Analysis on AES Key Expansion Revisited

Valentina  Luke 
T  23 Oct 2014 
Improved Short Lattice Signatures in the Standard Model 
Emmanuela  Joop 
T  16 Oct 2014 
Witnessindistinguishable proofs 
Sergiu  David B 
P  30 Oct 2014 
Compilerbased Side Channel Vulnerability Analysis and Optimised Countermeasures Application

David McCann  Jake 
T  9 Oct 2014 
Plaintext Awareness and Signed ElGamal

David B  Guy 