Loading...

Is Bitcoin Anonymous? Arvind Narayanan | Princeton University | Real World Cryptography Workshop

1,463 views

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Feb 8, 2014

Arvind Narayanan | Princeton University
Is Bitcoin Anonymous?
January 13th, 2014 Real World Cryptography Workshop: Hi-Def.



Monday, January 13
Session 1: Bitcoin

9:00am
Arvind Narayanan | Princeton University
Is Bitcoin Anonymous?

9:30am
Matthew Green | JHU
Anonymizing Cryptocurrencies: How to make Bitcoin Anonymous

10:00am
Yifu Guo | Avalon
Bitcoin

10:30am
Coffee Break
Session 2: Securing the Internet

11:00am
Hoeteck Wee | ENS -- Paris
On the Security of SSL/TLS

11:30am
Brian Warner | Mozilla
Firefox Sync: Securely Sharing Browser Data

12:00pm
Lunch
Session 3: Practical Multi-Party Computation

2:00pm
John Launchbury | Galois
Accelerating Secure Shared Computations to Useable Speeds

2:30pm
Jakob Illeborg Pagter | Partisia/Alexandra Institute
Multiparty Computation or: How I Learned to Stop Worrying and Love Cloud

3:00pm
Yehuda Lindell | Bar-Ilan University and Dyadic Security
Secure Multi-Party Computation: Background
Mitigating Server Breaches with Secure Computation

3:30pm
Coffee Break
Session 4: Cryptography

4:00pm
Shai Halevi | IBM
Multi-linear Maps

4:30pm
Hugo Krawczyk | IBM
Recent Advances in Encrypted Search

5:00pm Close
Tuesday, January 14
Session 5 : Payment Card Systems

9:00am
Marc Fischlin | TU Darmstadt
Analysis of Opacity

9:30am
Eric Le Saint | Visa Inc.
The Future of OPACITY

10:00am
Coffee Break
Session 6: Cryptography II

10:30am
Jonathan Trostle | Visa Inc.
Authenticated Encryption for Energy Constrained Environments

11:00am
Tom Shrimpton | Portland State University
Protocol Misidentification Made Easy with Format-Transforming Encryption

11:30am
Mike Bond | Cryptomathic
Crypto as a Service: Abracadabra?

12:00pm
Lunch
Session 7: Cryptographic Implementation

2:00pm
Dave Anderson | Seagate
The Architecture of Self-Encrypting Hard Drives

2:30pm
Christian Rechberger | DTU
Symmetric-crypto Research Meets Practice: Low Latency Ciphers

3:00pm
Francois Dupressoir | IMDEA Software Institute
Efficient Provably Secure Machine Code from High-Level Implementations

3:30pm
Coffee Break
Session 8: Short Talk Session

4:00pm
Short Talk Session program

5:00pm
Close
Wednesday, January 15
Session 9: Crypto Applications

9:00am
William Whyte | Security Innovation
A Security Credential Management System for V2V Communications

9:30am
Zooko Wilcox-O'Hearn | Least Authority
Tahoe-LAFS — encrypted peer-to-peer storage

10:00am
Moti Yung | Google
Let's get Real about the Real World: cryptography facing extreme system breaks

10:30am
Coffee Break
Session 10: The Snowden Revelations

11:00am
Bruce Schneier
The Fallout From Snowden: How can we regain trust in the Internet

11:30am Discussion

12:00pm
Lunch
Session 11: Crypto Applications II

2:00pm
Yevgeniy Dodis | New York University
Random Number Generation, Revisited

2:30pm
Dan Shumow | Microsoft Research
Certificate Reputation: Cryptographic Analysis of Public Keys in Use

3:00pm
Daniele Perito | Square
Secure and Private Service Discovery over Low Energy Bluetooth

3:30pm
Coffee Break
Session 12: Securing the Internet II

4:00pm
Dirk Balfanz | Google
Bringing Crypto Back: Web Authentication without Bearer Tokens

4:30pm
Douglas Stebila | Queensland University of Technology
Provable security of advanced properties of TLS and SSH

http://realworldcrypto.wordpress.com/

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up next


to add this to Watch Later

Add to

Loading playlists...