DIMACS/MACS Workshop on Cryptography for the RAM Model of Computation
June 8 - 10, 2016
MIT Media Lab - Massachusetts Institute of Technology
- Organizers:
- Ran Canetti, Boston University, canetti at bu.edu
- Mariana Raykova, Yale University
- Elaine Shi, Cornell University
- Mayank Varia, Boston University, varia at bu.edu
Presented under the auspices of the
DIMACS Special
Focus on Cryptography as part of
the DIMACS/Simons
Collaboration in Cryptography and the Modular Approach to Cloud
Security (bu.edu/macs) funded by NSF Frontier grant CNS-1414119.
Slides:
- David Archer, Galois
Practical Dynamic Composition of Operators in Secure Computation: VoIP and SQL
- Gilad Asharov, IBM
Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocation
- Dan Bogdanov, Cybernetica
Deploying Secure Computing for Real-world Applications
- Yilei Chen, Boston University
Adaptive Succinct Garbled RAM or How To Delegate Your Database
- Kai-Min Chung, Academia Sinica
Crypto for PRAM from iO
- Apoorvaa Deshpande, Brown University
Constrained Pseudorandom Functions for Unconstrained Inputs
- Chris Fletcher, MIT
The Ascend Secure Processor
- Dov Gordon, George Mason University
Secure Computation of MIPS Machine Code
- Justin Holmgren, MIT
SNARGs for P, and more, from poly-secure PIR
- Zahra Jafargholi, NEU
Adaptively Secure Garbled Circuits from One-Way Functions
- Stanislaw Jarecki, UC Irvine
Secure Computation ORAM -The Case of 3-Party Computation
- Marcel Keller, University of Bristol
The Oblivious Machine - or: How to Put the C into MPC
- Kartik Nayak, UMD
HOP: Hardware makes Obfuscation Practical
- Rafael Pass, Cornell University
Analysis and Design of Blockchains
- Oxana Poburinnaya, Boston University
Better 2-round adaptive MPC
- Antigoni Polychroniadou, Aarhus
The Exact Round Complexity of Secure Computation
- Pandu Rangan, IIT Madras (Visiting Faculty at NEU)
Stronger Public Key Encryption System Withstanding RAM Scraper Like Attacks
- Mariana Raykova, Yale University
Secure Linear Regression on Vertically Partitioned Datasets
- Thomas Ristenpart, Cornell University
Making Password Checking Systems Better
- Riad S. Wahby, Stanford University
Verifiable ASICs: Trustworthy Hardware with Untrusted Components
- Samee Zahur, University of Virginia
Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation
Workshop Index
DIMACS Homepage
Contacting the Center
Document last modified on June 28, 2016.