<html>
  <head>

    <meta http-equiv="content-type" content="text/html; charset=utf-8">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <p><br>
    </p>
    <div class="moz-forward-container"><br>
      <div dir="ltr">
        <div><span class="gmail-il" style="font-size:12.8px">This Friday
            at 10:30 we have our own Yilei Chen talking about his
            Eurocrypt 2017 paper. Lunch to follow.</span></div>
        <div><span class="gmail-il" style="font-size:12.8px"><br>
          </span></div>
        <div><span class="gmail-il" style="font-size:12.8px">Friday,
            March 3, 10:30 AM</span></div>
        <div><span class="gmail-il"><span style="font-size:12.8px">Hariri
              Institute for Computing Seminar room MCS 180, 111
              Cummington Mall</span><br>
          </span></div>
        <div><span class="gmail-il" style="font-size:12.8px"><br>
          </span></div>
        <div><span class="gmail-il" style="font-size:12.8px">
            <div style="font-size:12.8px">Cryptanalyses of candidate
              branching program obfuscators<br>
            </div>
            <div style="font-size:12.8px"><br>
            </div>
            <div style="font-size:12.8px">Abstract:</div>
            <div style="font-size:12.8px"><br>
            </div>
            <div style="font-size:12.8px">Cryptographic multilinear maps
              (graded encodings) and program obfuscation are fascinating
              tools. Their births opened a new way of thinking in
              cryptography. However, very little is known about the
              concrete security of these new candidate constructions. In
              this talk I will describe the candidate branching-program
              obfuscator proposed by Garg, Gentry, Halevi, Raykova,
              Sahai and Waters (GGHRSW, FOCS 2013), and show how we
              break it in certain settings. </div>
            <div style="font-size:12.8px"><br>
            </div>
            <div style="font-size:12.8px">Based on joint work with Craig
              Gentry and Shai Halevi.</div>
            <div style="font-size:12.8px"><a moz-do-not-send="true"
                href="https://eprint.iacr.org/2016/998" target="_blank">https://eprint.iacr.org/2016/<wbr>998</a></div>
          </span></div>
        <div><span class="gmail-il" style="font-size:12.8px"><br>
          </span></div>
        <span class="gmail-il" style="font-size:12.8px">BUsec</span><span
          style="font-size:12.8px"> Calendar:  </span><a
          moz-do-not-send="true" href="http://www.bu.edu/cs/busec/"
          target="_blank" style="font-size:12.8px">http://www.bu.edu/cs/<span
            class="gmail-il">busec</span>/</a><br
          style="font-size:12.8px">
        <span style="font-size:12.8px">The </span><span class="gmail-il"
          style="font-size:12.8px">busec</span><span
          style="font-size:12.8px"> seminar gratefully acknowledges the
          support of BU's Center for Reliable Information Systems and
          Cyber Security (RISCS).</span><br style="font-size:12.8px">
      </div>
    </div>
  </body>
</html>