<div dir="ltr"><div>The next Charles River Crypto Day will be hosted at BU on December 5!  </div><div><br></div><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Daniel Wichs</b> <span dir="ltr">&lt;<a href="mailto:wichs@ccs.neu.edu">wichs@ccs.neu.edu</a>&gt;</span><br>Date: Tue, Nov 18, 2014 at 7:24 AM<br>Subject: [charles-river-crypto-day] Charles River Crypto Day: Dec 5 @ BU<br>To: <a href="mailto:charles-river-crypto-day@googlegroups.com">charles-river-crypto-day@googlegroups.com</a><br>Cc: Nir Bitansky &lt;<a href="mailto:nbitansky@gmail.com">nbitansky@gmail.com</a>&gt;, Yael Kalai &lt;<a href="mailto:yael@microsoft.com">yael@microsoft.com</a>&gt;, Vinod Vaikuntanathan &lt;<a href="mailto:vinodv@mit.edu">vinodv@mit.edu</a>&gt;<br><br><br><div dir="ltr">Please join us for the next installment of the <a href="http://bostoncryptoday.wordpress.com/" target="_blank">Charles River Crypto Day</a> on Friday, December 5 at Boston University. The schedule is below. <br><br>Location: 111 Cummington Mall Room 180, <a href="http://www.bu.edu/hic/directions/" target="_blank">http://www.bu.edu/hic/directions/</a><br><br>Parking: There&#39;s a pay lot across the street <a href="http://www.bu.edu/maps/?id=2307" target="_blank">http://www.bu.edu/maps/?id=2307</a> and 4-hour meters on Bay State Road.<div><br>Hope to see you there!</div><div><br><p style="margin:0px 0px 15px;padding:0px;outline:0px;border:0px currentColor;color:rgb(0,0,0);line-height:1.5;font-family:&quot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif;font-size:12px;vertical-align:baseline"><span style="color:rgb(34,34,34);line-height:normal;font-family:Arial,Helvetica,sans-serif;font-size:13px">Daniel, Nir, </span><span style="color:rgb(34,34,34);line-height:normal;font-family:Arial,Helvetica,sans-serif;font-size:13px"> </span><span style="color:rgb(34,34,34);line-height:normal;font-family:Arial,Helvetica,sans-serif;font-size:13px">Vinod, </span><span style="color:rgb(34,34,34);line-height:normal;font-family:Arial,Helvetica,sans-serif;font-size:13px">Yael</span></p><p style="margin:0px 0px 15px;padding:0px;outline:0px;border:0px currentColor;color:rgb(0,0,0);line-height:1.5;font-family:&quot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif;font-size:12px;vertical-align:baseline">Schedule</p><table style="padding:0px;outline:0px;border:1px solid rgb(229,229,229);width:544px;color:rgb(0,0,0);font-family:&quot;Helvetica Neue&quot;,Helvetica,Arial,sans-serif;font-size:10px;vertical-align:baseline;border-collapse:collapse;border-spacing:0px"><tbody style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><tr style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><td width="105" valign="top" style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">9:30 – 10:00.</td><td style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">Introduction/Coffee</td></tr><tr style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><td valign="top" style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">10:00 – 11:00.</td><td style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid"><div style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;line-height:1.5;vertical-align:baseline">Yuval Ishai, Technion</div><div style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;line-height:1.5;vertical-align:baseline"><strong style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline">Circuits Resilient to Additive Attacks, with Applications to Secure Computation</strong></div></td></tr><tr style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><td valign="top" style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">11:30 – 12:30.</td><td style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">Omer Paneth, Boston University<br><strong style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline">Publicly-Verifiable Non-Interactive Arguments for Delegating Computations</strong></td></tr><tr style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><td valign="top" style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">12:30 – 2:00.</td><td style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">Lunch (provided)</td></tr><tr style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><td valign="top" style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">2:00 – 3:00.</td><td style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">Elaine Shi, University of Maryland<br><strong style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline">Programs to Circuits: Towards a Programming Language for Cryptography</strong></td></tr><tr style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline"><td valign="top" style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">3:30 – 4:30.</td><td style="padding:6px 15px;font-size:12px;border-top-color:rgb(229,229,229);border-top-width:1px;border-top-style:solid">Sergey Gorbunov, MIT<br><strong style="background:none;margin:0px;padding:0px;outline:0px;border:0px currentColor;vertical-align:baseline">Leveled Fully Homomorphic Signatures from Standard Lattices</strong></td></tr></tbody></table>Abstracts coming soon.<br><br>Thanks: NSF Frontier Award: Modular Approach to Cloud Security (MACS), Hariri Institute for Computing and Center for RISCS.<br><br>And a special thanks to Leo Reyzin for his help hosting Crypto Day at BU.</div></div><span class="HOEnZb"><font color="#888888">

<p></p>

</font></span></div>
</div>