News
|
Speaker | Affiliation | Date | Title |
---|---|---|---|
Klim Efremenko | University of Chicago | Wednesday, Feb 19th, 2014 | List and Unique Coding of Interactive Communication |
Raef Bassily | Penn State | Thursday, Nov 7th, 2013 | Causal Erasure Channels |
Bjoern Tackmann | ETH Zurich | Thursday, Oct 23rd, 2013 | Constructive Cryptography -- Introduction and Applications |
Adam Groce | University of Maryland | Thursday, Oct 24th, 2013 | Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Database Privacy |
Ranjit Kumaresan | Technion | Wednesday, Sep 25th, 2013 | On the Cryptographic Complexity of the Worst Functions |
Daniel Dadush | NYU | Thursday, May 9th, 2013 | On the Lattice Smoothing Parameter Problem |
Anat Paskin | UCLA | Thursday, May 2st, 2013 | Maliciously circuit-private homomorphic encryption for branching programs |
Shiri Chechik | Weizmann Institute of Science | Wednesday, April 10, 2013 | Distance Oracles with Local Stretch |
Sarah Meiklejohn | UCSD | Thursday, April 4, 2013 | Controlled Malleability in Cryptography |
Vassilis Zikas | UCLA | Thursday, March 28, 2013 | Universally Composable Synchronous Computation |