Presentaciones de la Crypto Rump 2014
Crypto Rump es un evento de un sólo día donde se presentan temas sobre cifrado. Las presentaciones son cortas y el evento dura poco menos de 4 horas. Este año dicho evento se celebró el 19 de agosto. Como de costumbre, os dejamos la lista con las presentaciones que están publicadas:
- Program Co-Chairs Report
- Privacy, Security & Trust
- Tetris-based Cryptography: a gateway to serious Crypto
- Cryptogramma.com
- Public Verifiable Randomness Beacon for Random Sample Elections
- Deniable and not self-harming trapdoors
- NIST VCAT Report and Dual EC DRBG
- NIST Update: Elliptic Curves and More!
- New Cryptography Libraries from Microsoft Research
- Bits Security of the CDH Problems over Finite Fields
- Fast Lattice Point Enumeration with Minimal Overhead
- Jobs available
- Just a little of that human touch
- Update on the 10000 Euro PRINCE cipher-breaking challenge: Results of Round-1
- On the Security of the FX-Construction (feat. PRINCE and PRIDE)
- Spritz: a spongy RC4-like stream cipher and hash function
- Randomness Extraction with Streaming Algorithms
- The graduate acoustic attack: The sound of silence
- DNSSEC
- SPOKE: Simple Password-Only Key Exchange in the Standard Model
- How Secure and Quick is QUIC in Presence of Malice?
- An Exercise in Shooting Yourself in the Foot: Automating the Cryptographer
- The Bitcoin Backbone: Analysis and Applications
- A New Non-Malleable Commitment Scheme
- Multiparty illumination
- Postponing the Deadline of the Best Crypto Competition Ever!
- Circuit ORAM and on the Tightness of the Goldreich-Ostrovsky ORAM Lower Bound
- Oblivious Data Structures
- SCVM: An Efficient, Automated RAM Model Secure Computation Framework
- Awesome MPC
- Introducing TinyLEGO, smaller is sometimes better
- An Annotated Bibliography of Practical Secure Computation
- A Unifying Framework for Computation on Encrypted Data
- New Graded Multilinear Maps from Lattices
- Fully Secure Attribute Based Encryption from Multilinear Maps
- Implementing Cryptographic Program Obfuscation
- Order-Revealing Encryption
- Verifiable Member and Order Queries on a List in Zero Knowledge
- Four minutes of fast talking about order-preserving encryption