Past events

A listing of previous events.

14 Jul 2016 - Andreas Lochbihler

Probabilistic functions and cryptographic oracles in higher order logic.

26 May 2016 - George Theodorakopoulos

Towards optimal protection of location privacy

12 May 2016 - Foteini Baldimtsi

Efficient Cryptographic Tools for Privacy-Preserving Applications

28 Apr 2016 - Alastair Beresford

Whack-a-mole security: incentivising the production, delivery and installation of security updates

17 Dec 2015 - Aydin Abadi

Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.

05 Nov 2015 - Mariana Raykova

Candidate Construction for Indistinguishability Obfuscation and Applications

17 Sep 2015 - Andru Gheorghiu

Robustness and device independence of verifiable blind quantum computing

28 May 2015 - Anna Pappa

Quantum Coin Flipping

07 May 2015 - Peter Ryan

E2E Verifiable Voting Schemes, Theory to Practice

02 Apr 2015 - Alessandro Bruni

Set-abstractions in the Applied Pi-calculus

26 Feb 2015 - Vincent Cheval

Timing attacks in security protocols: symbolic framework and proof techniques

19 Feb 2015 - Andru Gheorghiu

Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

12 Feb 2015 - Changyu Dong

Towards Practical Data-intensive Secure Computation

29 Jan 2015 - N. Asokan

How Far Are You? Finding Path Length Between Two People On a Social Network

15 Jan 2015 - Ian Goldberg

DP5: Privacy-preserving Presence Protocols

04 Dec 2014 - David Bernhard

Cryptographic Voting: handing over the baton

27 Nov 2014 - Konstantin Knorr

Cyber Security in the Design, Development, and Maintenance of Critical Infrastructure Systems

13 Nov 2014 - Petros Wallden

Quantum Cryptography III

30 Oct 2014 - Petros Wallden

Quantum Cryptography II

16 Oct 2014 - William Waites

Distributed Denial of Service Attacks

02 Oct 2014 - Petros Wallden

Quantum Cryptography I

24 Jul 2014 - Marco Gaboardi

C. Dwork, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (invited), 2006

10 Jul 2014 - Myrto Arapinis

V. Shoup, Sequences of Games: A tool for Taming Complexity in Security Proofs