RWC 2015 Jan. 7, 2015 to Jan. 9, 2015, London,UK

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcoming Remarks Kenny Paterson N/A
Tor vs. mass surveillance Roger Dingledine N/A
SecureDrop: anonymous/secure communications for journalists and sources Yan Zhu , Garrett Robinson N/A
Error-prone cryptographic designs Dan Bernstein N/A IncludeThinkstScapes
The EC_DRBG/VCAT review and overview of NIST processes John Kelsey N/A
Virtual currencies: Obstacles and applications beyond currency Sarah Meiklejohn N/A
Facebook: Password Hashing & Authentication Alec Muffett N/A IncludeThinkstScapes
Life of a password Arvind Mani N/A
In PETs we trust: Gaps between privacy enhancing technologies and information privacy law Claudia Diaz N/A
The ISO Standardization Process of PLAID: A Cryptographer’s Perspective Marc Fischlin , Kenneth g. Paterson , Arno Mittelbach , Tommaso Gagliardoni , Felix Günther , Jean Paul Degabriele , Victoria Fehr , Giorgia Azzurra Marson N/A
Cryptography is for Everyone: From W3C Web Cryptography API to Client-Encrypted Email and Back Again Harry Halpin N/A
New Kid on the Block: CLINT: A Cryptographic Library for the INternet of Things Michael Scott N/A
One of our algorithms is missing: Crypto APIs in 2014 Graham Steel N/A
Searching Encrypted Cloud Data: Case Study on Academia + Industry (Done Right) Sasha Boldyreva N/A
Can encryption save the credit card? A decade of standards and implementation Terence Spies N/A
Authenticated encryption and the CAESAR competition Elena Andreeva N/A
Smarter decisions with no privacy breaches - practical secure computation for governments and companies Dan Bogdanov N/A
Superfolding Circuits with Logic Synthesis Farinaz Koushanfar , Ahmad Sadeghi N/A
The ins and outs of programming cryptography in smart cards Pascal Paillier N/A
The Need for Speed: Applications of High Performance Computing in Side Channel Research Elisabeth Oswald N/A
Hardware Security Modules: What they are and why it's likely that you've used one today Paul Hampton N/A
We <3 SSL Emilia Kasper N/A
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem Douglas Stebila , Joppe w. Bos , Michael Naehrig , Craig Costello N/A
Post-Snowden Elliptic Curve Cryptography Joppe w. Bos , Patrick Longa , Michael Naehrig , Craig Costello N/A
Triple Handshake: Can cryptography, formal methods, and applied security be friends? Markulf Kohlweiss , Karthik Bhargavan N/A
Crypto at Scale Brian Sniffen N/A
Protecting Data in Untrusted Locations - An exercise in real-world threat modelling Jan Schaumann N/A
Universal SSL Nick Sullivan N/A
TLS 1.3 Eric Rescorla N/A
Privacy-preserving presence protocols Ian Goldberg N/A
Innovation in end-to-end encrypted communication tools Joseph Bonneau N/A
When Tor and Bitcoin meet each other Alex Biryukov , Ivan Pustogarov N/A
Lessons Learned from Implementing Privacy-Preserving Protocols for Smart Meters Klaus Kursawe , Benessa Defend N/A
Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts Vasily Mikhalev , Frederik Armknecht , Matthias Hamann N/A
Embedded Device Cryptography in the Field Alex Kropivny N/A
Towards Provably-Secure Optimizing Masking Compilers Pierre-alain Fouque , Sonia Belaid , Pierre-yves Strub , Gilles Barthe , François Dupressoir , Benjamin Grégoire N/A