About the Workshop
This event is designed to bring together researchers and students in cryptography from across India to discuss research, learn about recent, cutting edge advances in the field and create an environment for collaboration. The event is co-organized by Shweta Agrawal (IIT Madras) and Satya Lokam (MSR, Bengaluru). |
![]() |
Keynote Speakers
![]() |
  Vinod Vaikuntanathan   MIT. |
![]() |
  Amit Sahai   UCLA. |
Joining Via Zoom
Schedule
Time | Speaker | Title |
---|---|---|
11:00- 11:45 | Pratyay Mukherjee | Reusable MPC from DDH |
11:45 - 12:15 | Divya Gupta | PIE: Practical 2-Party Secure Inference |
12:15 - 12:45 | Chaya Ganesh | Cryptographic Reverse Firewalls for Interactive Proof Systems |
12:45 - 2:00 | Lunch Break | |
2:00 - 2:45 | Akshayaram Srinivasan | Leakage-Resilient Circuit Compilers:
Achieving Unconditional Security against Low-Complexity Leakage. Slides here. |
2:45 - 3:30 | Manoj Prabhakaran | Extending the Foundations of Differential Privacy |
3:30 - 4:15 | Coffee Break | |
4:15 - 4:40 | Varun Narayan | On One-Way Secure Computation. |
4:40 - 5:00 | Rajeevalochana Raghunath | On Communication Models and Best-Achievable Security in Two-Round MPC. |
5:00 - 5:20 | Guruvamsi Policharla | Group Structure in Correlations and with Applications to Cryptography. Slides here. |
5:20 - 5:30 | Short Break | |
5:30 - 6:30 | Vinod Vaikuntanathan | Breaking Barriers in Secret Sharing. Slides here. |
17th July:
Time | Speaker | Title |
---|---|---|
9:30- 10:30 | Amit Sahai | Indistinguishability Obfuscation: New Opportunities. Talk here. |
11:00 - 11:45 | Dhiman Saha | New Results on the SymSum Distinguisher on Round-Reduced SHA3. Slides here. |
11:45 - 12:30 | Aishwarya Thiruvengadam | Towards Exact Round Complexity of Ideal Cipher Constructions. |
12:30 - 2:00 | Lunch Break | |
2:00 - 2:30 | Somitra Sanadhya and Abhishek Kumar | Format preserving encryption. Slides here . |
2:30 - 3:00 | Nilanjan Datta | NIST standardization of lightweight Authenticated Encryption. Slides here. |
3:00 - 3:30 | Ashwin Jha | Towards an Improved Bound on CBC Collision Probability and Its Applications. Slides here. |
3:30 - 4:15 | Coffee Break | |
4:15 - 4:40 | Sebati Ghosh | Towards building a practical variable tag length MAC. Slides here. |
4:40 - 5:05 | Annapurna Valiveti | Second-Order Masked Lookup Table Compression Scheme |
5:05 - 5:30 | Arasu Arun | Cross Chain Synchronization for blockchains. |
5:30 - 5:55 | Ananya Srivastava | Oblivious data trading using Blockchain. Slides here. |