Skip to main content
Search
Utility navigation
Calendar
Contact
Login
MAKE A GIFT
Main navigation
Home
Programs & Events
Research Programs
Workshops & Symposia
Public Lectures
Research Pods
Internal Program Activities
Algorithms, Society, and the Law
People
Scientific Leadership
Staff
Current Long-Term Visitors
Research Fellows
Postdoctoral Researchers
Scientific Advisory Board
Governance Board
Industry Advisory Council
Affiliated Faculty
Science Communicators in Residence
Law and Society Fellows
Participate
Apply to Participate
Plan Your Visit
Location & Directions
Postdoctoral Research Fellowships
Law and Society Fellowships
Science Communicator in Residence Program
Circles
Breakthroughs Workshops and Goldwasser Exploratory Workshops
Support
Annual Fund
Funders
Industrial Partnerships
News & Videos
News
Videos
About
Image
The Mathematics of Modern Cryptography
Program
Cryptography
Location
Calvin Lab Auditorium
Date
Monday, July 6
–
Friday, July 10, 2015
Back to calendar
Breadcrumb
Home
Workshop & Symposia
Schedule
Secondary tabs
The Workshop
Schedule
Videos
Click on the titles of individual talks for abstract, slides and archived video.
All events take place in the Calvin Lab Auditorium.
Monday, July 6, 2015
9
–
9:20 a.m.
Coffee and Check-In
9:20
–
9:30 a.m.
Opening Remarks
9:30
–
11 a.m.
Fully Homomorphic Encryption and Signatures
Daniel Wichs, Northeastern University
,
Zvika Brakerski, Weizmann Institute
Video
9:30
–
11 a.m.
Fully Homomorphic Encryption and Signatures
Daniel Wichs, Northeastern University
,
Zvika Brakerski, Weizmann Institute
Video
11
–
11:30 a.m.
Break
11:30 a.m.
–
1 p.m.
Attribute-Based and Predicate Encryption
Vinod Vaikuntanathan, Massachusetts Institute of Technology
,
Hoeteck Wee, École Normale Supérieure Paris
Video
11:30 a.m.
–
1 p.m.
Attribute-Based and Predicate Encryption
Vinod Vaikuntanathan, Massachusetts Institute of Technology
,
Hoeteck Wee, École Normale Supérieure Paris
Video
1
–
3 p.m.
Lunch
3
–
4:30 p.m.
Historical Talk on Lattice-Based Cryptography
Daniele Micciancio, UC San Diego
Video
4:30
–
5:30 p.m.
Reception
Tuesday, July 7, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
10:30 a.m.
Cryptography from Ideal Lattices [and Discussion]
Damien Stehlé, École Normale Supérieure de Lyon
Video
10:30
–
11 a.m.
Break
11 a.m.
–
12 p.m.
Solving SVP and CVP in 2^n time with Discrete Gaussian Sampling
Noah Stephens-Davidowitz, New York University
,
Daniel
,
Dadush, CWI, Amsterdam
Video
11 a.m.
–
12 p.m.
Solving SVP and CVP in 2^n time with Discrete Gaussian Sampling
Noah Stephens-Davidowitz, New York University
,
Daniel
,
Dadush, CWI, Amsterdam
Video
12
–
2 p.m.
Lunch
2
–
2:30 p.m.
Algebraic Algorithms for LWE
Ludovic Perret, Université Pierre et Marie Curie
Video
2:30
–
3 p.m.
Attacks on Ring-LWE
Kristin Lauter,
,
Microsoft Research Redmond
Video
3
–
3:30 p.m.
Break
3:30
–
4:15 p.m.
How Diffie-Hellman Fails in Practice
Nadia Heninger, University of Pennsylvania
Video
Wednesday, July 8, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
10:30 a.m.
Arithmetic Cryptography
Benny Applebaum, Tel Aviv University
Video
10:30
–
11 a.m.
Break
11
–
11:30 a.m.
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky (Massachusetts Institute of Technology)
Video
11:30 a.m.
–
12 p.m.
Output-Compressing Randomized Encodings and Applications
Huijia Lin (University of Washington)
Video
12
–
2 p.m.
Lunch
2
–
2:30 p.m.
Somewhat Homomorphic Encryption via Number Fields and Finite Fields
Jeff Hoffstein, Brown University
2:30
–
3 p.m.
Efficient RKA-Secure KEM Scheme Against Invertible Functions
Keita Xagawa
,
, NTT Secure Platform Laboratories
3
–
3:30 p.m.
Break
3:30
–
4 p.m.
TESLA: Tightly Secure, Efficient Signature Scheme from Standard Lattices
Nina Bindel, Technische Universität Darmstadt
4
–
4:25 p.m.
An Improved BKW Algorithm for LWE
Paul Kirchner, École Normale Supérieure Paris and UC San Diego
4:30
–
4:55 p.m.
The Preprocessing of Lattice Point Enumeration
Michael Walter, UC San Diego
Thursday, July 9, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30
–
10:30 a.m.
Noisy Connections: A Survey of Interactive Coding and Its Borders with Other Topics
Allison Bishop, Columbia University
Video
10:30
–
11 a.m.
Break
11 a.m.
–
12 p.m.
Non-Malleable Codes in the Split-State Model
Yevgeniy Dodis, New York University
Video
12
–
2 p.m.
Lunch
2
–
2:30 p.m.
Finding Short Generators of Principal Ideals
Chris Peikert (Georgia Institute of Technology)
,
Georgia Institute of Technology
Video
2:30
–
3 p.m.
Lattices with Symmetry
Alice Silverberg,
,
University of California, Irvine
Video
Friday, July 10, 2015
9
–
9:30 a.m.
Coffee and Check-In
9:30 a.m.
–
10:15 p.m.
Graph-Induced Multilinear Maps from Lattices
Shai Halevi, IBM T.J. Watson Research Center
Video
10:15
–
10:45 a.m.
Break
10:45
–
11:30 a.m.
Multilinear Maps Over the Integers: From Design to Security
Tancrède Lepoint, CryptoExperts
Video
11:30 a.m.
–
12 p.m.
Discussion on Multilinear Maps, Assumptions and Attacks
12
–
2 p.m.
Lunch
2
–
3 p.m.
Cryptography via Burnside Groups
Antonio Nicolosi, Stevens Institute of Technology
,
Nelly Fazio, City University of New York
Video
Share this page
Copy URL of this page
link to homepage
Close
Main navigation
Home
Programs & Events
Research Programs
Workshops & Symposia
Public Lectures
Research Pods
Internal Program Activities
Algorithms, Society, and the Law
People
Scientific Leadership
Staff
Current Long-Term Visitors
Research Fellows
Postdoctoral Researchers
Scientific Advisory Board
Governance Board
Industry Advisory Council
Affiliated Faculty
Science Communicators in Residence
Law and Society Fellows
Participate
Apply to Participate
Plan Your Visit
Location & Directions
Postdoctoral Research Fellowships
Law and Society Fellowships
Science Communicator in Residence Program
Circles
Breakthroughs Workshops and Goldwasser Exploratory Workshops
Support
Annual Fund
Funders
Industrial Partnerships
News & Videos
News
Videos
About
Utility navigation
Calendar
Contact
Login
MAKE A GIFT
link to homepage
Close
Search