This event is designed to bring together researchers and students in cryptography from across India to discuss research, learn about recent, cutting edge advances in the field and create an environment for collaboration.

The event is co-organized by Shweta Agrawal (IIT Madras) and Satya Lokam (MSR, Bengaluru).
Image
Image   Vinod Vaikuntanathan
  MIT.
Image   Amit Sahai
  UCLA.
Please click this link to join the webinar. Password: 406879
16th July:

Time Speaker Title
11:00- 11:45 Pratyay Mukherjee Reusable MPC from DDH
11:45 - 12:15 Divya Gupta PIE: Practical 2-Party Secure Inference
12:15 - 12:45 Chaya Ganesh Cryptographic Reverse Firewalls for Interactive Proof Systems
12:45 - 2:00 Lunch Break
2:00 - 2:45 Akshayaram Srinivasan Leakage-Resilient Circuit Compilers:
Achieving Unconditional Security against Low-Complexity Leakage. Slides here.
2:45 - 3:30 Manoj Prabhakaran Extending the Foundations of Differential Privacy
3:30 - 4:15 Coffee Break
4:15 - 4:40 Varun Narayan On One-Way Secure Computation.
4:40 - 5:00 Rajeevalochana Raghunath On Communication Models and Best-Achievable Security in Two-Round MPC.
5:00 - 5:20 Guruvamsi Policharla Group Structure in Correlations and with Applications to Cryptography. Slides here.
5:20 - 5:30 Short Break
5:30 - 6:30 Vinod Vaikuntanathan Breaking Barriers in Secret Sharing. Slides here.


17th July:
Time Speaker Title
9:30- 10:30 Amit Sahai Indistinguishability Obfuscation: New Opportunities. Talk here.
11:00 - 11:45 Dhiman Saha New Results on the SymSum Distinguisher on Round-Reduced SHA3. Slides here.
11:45 - 12:30 Aishwarya Thiruvengadam Towards Exact Round Complexity of Ideal Cipher Constructions.
12:30 - 2:00 Lunch Break
2:00 - 2:30 Somitra Sanadhya and Abhishek Kumar Format preserving encryption. Slides here .
2:30 - 3:00 Nilanjan Datta NIST standardization of lightweight Authenticated Encryption. Slides here.
3:00 - 3:30 Ashwin Jha Towards an Improved Bound on CBC Collision Probability and Its Applications. Slides here.
3:30 - 4:15 Coffee Break
4:15 - 4:40 Sebati Ghosh Towards building a practical variable tag length MAC. Slides here.
4:40 - 5:05 Annapurna Valiveti Second-Order Masked Lookup Table Compression Scheme
5:05 - 5:30 Arasu Arun Cross Chain Synchronization for blockchains.
5:30 - 5:55 Ananya Srivastava Oblivious data trading using Blockchain. Slides here.