Date: January 4 - 6,  2017
Location: Columbia University in New York City
                    Co-hosted by the Columbia University DSI Center for Cybersecurity

Program

Wednesday 4th Jan

 08.00    Arrival and Registration  
 09.00    RWC Committee     
 Welcome
   Session 1: TLS Engineering
 Session Chair: Kenny Paterson
 09.15     Rich Salz
 Software engineering and OpenSSL is not an oxymoron
 09.40     Thai Duong, Emilia Kasper and  Quan Nguyen  Project Wycheproof - Scaling crypto testing
 09.55     Jacob Abbott, Pratik Patel, Zheng Dong, Kevin Kane,  David Cooper, Siyu Chen and L Jean Camp.  X.509 in Practice (It's worse than you think)
 10.20    Quan Nguyen   
 Is Crypto Software Safe Yet?
 10.35     Break  
   Session 2: Crypto For Internet Protocols
 Session chair: Aggelos Kiayias
 11.00     Sharon Goldberg
 NSEC5: Provably Preventing DNSSEC Zone Enumeration
 11.30  Daniel Franke
 Cryptographically Securing the Network Time Protocol
  Special Session: Levchin Prize for Real-World Cryptography
 
 11.55    Award ceremony  
 12.20  Lunch  
   Session 3: Quantum and Post-Quantum
 Session Chair: Dan Boneh
 13.45  Evan Jeffrey  
Joppe Bos
 The physics of building a quantum computer
Security assessment of software security: A closer look at white-box cryptographic implementations
 14.15     Rene Peralta
 NIST's Post-Quantum Cryptography Project
 14.35  Tancrède Lepoint    Cryptographic Suite for Algebraic Lattices — CRYSTAL
 15.05     Break  
   Session 4: Post-Quantum Crypto
  Session Chair: Dan Boneh
 15.45  Valeria Nikolaenko   Practical post-quantum key exchange from both ideal and generic lattices
 16.15     Michael Naehrig
 Supersingular Isogeny Diffie-Hellman
   Session 5: Embedded Crypto
 Session Chair: Lejla Batina
 16.45  Mike Hamburg
 The Strobe protocol framework
 17.10  Patrick Longa
 FourQ based cryptography for high performance and low power applications
 17.40     Reception  


Thursday 5th Jan

   Session 6: MPC
 
 09.00  Yehuda Lindell
 High-Throughput Secure 3PC for Semi-Honest and Malicious Adversaries - Breaking the Billion-Gate per Second Barrier
 09.15  Ben Kreuter
 Secure Multiparty Computation at Google
 09.45  Hervé Chabanne, Jonathan Milgram, Emmanuel Prouff, Constance Morel, Aurélie Phesso  Privacy-Preserving Classification on Deep Neural Network
 10.00  Break  
   Session 7: Applications and Lawsuits
 Session Chair: Dan Boneh
 10.25  Jon Millican
 Challenges of E2E Encryption in Facebook Messenger
 10.50  Moti Yung
 Memories for Your Eyes Only
 11.20  Mitch Stoltz
 DMCA
   Special Session: Lightning Talks
 Session Chair: Nigel Smart
 11.50  Adverts, Jobs, New Results  (No slides)
 12.30     Lunch  
   Session 8: Key Exchange and Secure Messaging Protocols
 Session Chair: Kenny Paterson
 13.45     Trevor Perrin
 Message Encryption
 14.15  Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt and Douglas Stebila  A Formal Security Analysis of the Signal Messaging Protocol
 14.30  Felix Günther, Britta Hale, Tibor Jager and Sebastian Lauer  0-RTT Key Exchange with Full Forward Secrecy
 14.45  Pierre-Alain Fouque, Cristina Onete and Benjamin Richard  Towards 5G Authenticated Key-Exchange: the security and privacy of the AKA Protocol
 15.00  Break  
   Session 9: Passwords and Authentication
 Session Chair: Tom Ristenpart
 15.40  Hugo Krawczyk  Is Password InSecurity Inevitable? Cryptographic Enhancements to Password Protocols
 16.10     Jeremiah Blocki, Joel Alwen and Krzysztof Pietrzak  Towards a Theory of Data-Independent Memory Hard Functions
 16.40     Stefano Tessaro
The memory-hardness of Scrypt
 17.10  George Tankersley, Filippo Valsorda and Alex Davidson
 Solving the Cloudflare CAPTCHA
 17.30  
 End of Day 2
 


Friday 6th Jan
   Session 10: Implementations
 Session Chair: Tom Shrimpton
 09.00  Joppe Bos  
 Evan Jeffrey  
 Security assessment of software security: A closer look at white-box cryptographic implementations
The physics of building a quantum computer
 09.30  Laurent Simon
 Erasing secrets from RAM
   Session 11: TPMs and Chips  Session Chair: Tom Shrimpton
 09.45  Anja Lehmann  Direct Anonymous Attestation and TPM 2.0: Getting Provably-Secure Crypto into the Real-World
 10.10     Helena Handschuh  DPA Resistance for Real People
 10.40  Break  
   Session 12: Searching on Encrypted Data
 Session Chair: Kenny Paterson
 11.05    David Cash
 What Else is Revealed by Order-Revealing Encryption
 11.35  Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart and Vitaly Shmatikov  Breaking Web Applications Built On Top of Encrypted Data
 12:00    Raluca Ada Popa Building web applications on top of encrypted data
 12.25  Lunch  
   Session 13: TLS Attacks
 Session Chair: Tom Ristenpart
 13.30  David McGrew, Blake Anderson, Scott Fluhrer and Chris Shenefiel  PRNG Failures and TLS Vulnerabilities in the Wild
 13.55  Olivier Levillain, Maxence Tury and Nicolas Vivet  Concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
 14.10 Eva Sarafianou, Dionysis Zindros and Aggelos Kiayias  Productizing TLS Attacks: The Rupture API
 14.25     Break  
   Session 14: Blockchain
Session Chair: Aggelos Kiayias
 14.50  Elaine Shi Rethinking Internet-Scale Consensus
 15.20  Pedro Moreno-Sanchez and Aniket Kate  Listening to and Silencing the Whispers of Ripple: Study and Solutions for Privacy in IOweYou Credit Networks
 15.45  Elli Androulaki, Christian Cachin and Marko Vukolić  Cryptography and Protocols in Hyperledger Fabric
 16.10  Dmitry Meshkov, Leonid Reyzin, Alexander Chepurnoy and Sasha Ivanov  Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
 16.25  Conference Closes