Schedule


Tuesday, September 12, 2006

9:00 - 10:00
Dan Boneh (Stanford University)

Pairing-based Cryptography

10:15 - 11:00
Dan Boneh (Stanford University)

Pairing-based Cryptography

11:15 - 12:00
Dan Boneh (Stanford University)

Pairing-based Cryptography


Wednesday, September 13, 2006

9:00 - 10:00
Jonathan Katz (University of Maryland)

Black-Box Reductions, Impossibility Results and Efficiency Lower Bounds

10:15 - 11:00
Jonathan Katz (University of Maryland)

Black-Box Reductions, Impossibility Results and Efficiency Lower Bounds

11:15 - 12:00
Jonathan Katz (University of Maryland)

Black-Box Reductions, Impossibility Results and Efficiency Lower Bounds

2:00 - 3:00
Rafail Ostrovsky (UCLA)

A survey on Private Information Retrieval

3:15 - 4:00
Rafail Ostrovsky (UCLA)

A survey on Private Information Retrieval

4:15 - 5:00
Rafail Ostrovsky (UCLA)

A survey on Private Information Retrieval


Thursday, September 14, 2006

9:00 - 10:00
Kobbi Nissim (Ben Gurion University of the Negev)

Database Privacy

10:15 - 11:00
Kobbi Nissim (Ben Gurion University of the Negev)

Database Privacy

11:15 - 12:00
Kobbi Nissim (Ben Gurion University of the Negev)

Database Privacy

2:00 - 3:00
Yuval Ishai (Technion - Israel Institute of Technology)

Randomization techniques and parallel cryptography
Presentation (PowerPoint File)

3:15 - 4:00
Yuval Ishai (Technion - Israel Institute of Technology)

Randomization techniques and parallel cryptography
Presentation (PowerPoint File)

4:15 - 5:00
Yuval Ishai (Technion - Israel Institute of Technology)

Randomization techniques and parallel cryptography
Presentation (PowerPoint File)


Friday, September 15, 2006

9:00 - 10:00
Ran Canetti (IBM Thomas J. Watson Research Center)

Security and composition of cryptographic protocols
Presentation (PowerPoint File)

10:15 - 11:00
Ran Canetti (IBM Thomas J. Watson Research Center)

Security and composition of cryptographic protocols
Presentation (PowerPoint File)

11:15 - 12:00
Ran Canetti (IBM Thomas J. Watson Research Center)

Security and composition of cryptographic protocols
Presentation (PowerPoint File)