Past events

A listing of previous events.

Probabilistic functions and cryptographic oracles in higher order logic.

Towards optimal protection of location privacy

Efficient Cryptographic Tools for Privacy-Preserving Applications

Whack-a-mole security: incentivising the production, delivery and installation of security updates

Verifiable Delegated Private Set Intersection on Outsourced Private Datasets.

Candidate Construction for Indistinguishability Obfuscation and Applications

Robustness and device independence of verifiable blind quantum computing

Quantum Coin Flipping

E2E Verifiable Voting Schemes, Theory to Practice

Set-abstractions in the Applied Pi-calculus

Timing attacks in security protocols: symbolic framework and proof techniques

Rosario Gennaro, Craig Gentry, and Bryan Parno. Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

Towards Practical Data-intensive Secure Computation

How Far Are You? Finding Path Length Between Two People On a Social Network

DP5: Privacy-preserving Presence Protocols

Cryptographic Voting: handing over the baton

Cyber Security in the Design, Development, and Maintenance of Critical Infrastructure Systems

Quantum Cryptography III

Quantum Cryptography II

Distributed Denial of Service Attacks

Quantum Cryptography I

C. Dwork, Differential Privacy, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (invited), 2006

V. Shoup, Sequences of Games: A tool for Taming Complexity in Security Proofs