Thursday, August 5
9:00 – 9:30Welcome and opening remarks
9:30 – 10:50 | VideoPoint Obfuscation and Friends, Ran CanettiOutsourcing Computation, Craig Gentry
10:50 – 11:10Coffee break
11:10 – 12:30 | VideoWriting on Wind and Water: Enforcing File Robustness in the Cloud, Ari JuelsEfficient Verification of Outsourced Data and Computations, Charalampos(Babis) Papamanthou
12:30 – 2:00Lunch
2:00 – 4:00 | VideoPredicate Encryption, Emily ShenStructured Encryption and Controlled Disclosure, Seny KamaraCloud Cryptography: A new era for cryptographic research, Giuseppe Atteniese
4:00 – 4:20Coffee break
4:20 – 5:40 | VideoCloudy, Without a Chance of Data Loss – Implementation, Kevin BowersDynamic Symmetric Searchable Encryption, Tom Roeder
6:00 – 7:30Reception
7:30 – ? Rump session
Friday, August 6
10:00 – 12:00Sharing Sensitive Information with Privacy, Gene TsudikComputing with Multivariate Polynomials and Application to Multi-Party Secure Set Intersection, Mariana RaykovaZero Knowledge Sets: Short Commitments and Proofs for Large Sets, Melissa Chase
12:00 – 1:30Lunch
1:30 – 3:30 | VideoVirtual Machine Reset Vulnerabilities and Hedged Cryptography, Tom RistenpartSubspace LWE, Krzysztof PietrzakCryptography Against Continuous Memory Attacks, Yevgeniy Dodis
3:30 – 3:50Coffee break
3:50 – 5:50 | VideoRerandomizable Yao Circuits and i-Hop Homomorphic Encryption, Vinod VaikuntanathanBi-Deniable Encryption, Chris PeikertWe Have The Technology, Now Where Next?, David Molnar
5:50 – 6:00Closing remarks