Seminar details


Grenoble

13 January 2012 - 08h15
Workshop on Computed-Aided Security
by from VERIMAG



Abstract: We organize one-day workshop on Computed-Aided Security.


PROGRAM

  • 8h30 -9h15 Automated verification of equivalence properties of cryptographic protocols by Steve Kremer, LORIA Nancy.
  • 9h15 -10h00 Game-based Compositional Key-Exchange by Bogdan Warinschi, Bristol UK.
  • 10h00 - 10h15 Break.
  • 10h15 - 12h30 Session 2 :
  • 10h15 - 11h00 Towards unconditional soundness by Hubert Comon, LSV ENS Cachan.
  • 11h00 - 11h45 Automatically Verified Mechanized Proof of One-Encryption Key Exchange by Bruno Blanchet, LIENS ENS.
  • 11h45 - 12h30 Policy Auditing over Incomplete Logs by Anupam Datta, CMU.
  • 12h30 - 14h00 Lunch.
  • 14h00 - 15h30 Session 3:
  • 14h00 - 14h45 Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions by David Pointcheval, LIENS ENS.
  • 14h45 - 15h30 From indifferentiability to cyber-security: threats and needs by Emmanuel Bresson, Emiraje Systems.
  • 15h30 -15h45 Break.
  • 15h45 - 16h55 Session 4:
  • 15h45 - 16h20 Probabilistic Relational Reasoning for Differential Privacy by Gilles Barthe, IMDEA Spain.
  • 16h20 - 16h55 Characterising Computational Entropy by Bruce Kapron, University of Victoria.





Contact | Site Map | Site powered by SPIP 4.2.13 + AHUNTSIC [CC License]

info visites 4005361