CINXE.COM
FC'17 : Program
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>FC'17 : Program</title> <meta http-equiv="Content-Type" content="text/html;charset=utf-8" /> <meta name="keywords" content="fc17, financial cryptography, conference" /> <meta name="description" content="Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited." /> <link rel="stylesheet" href="fc17.css" type="text/css" /> </head> <body> <div class="header"> <table class="header" border="0" cellspacing="0" cellpadding="0"> <tr> <td colspan="2" class="header"> </td> </tr> <tr> <td class="menu"> <div class="menu"> <p><a href="index.html" class="menu">Home</a></p> <p><a href="cfp.html" class="menu">Call for Papers</a></p> <p><strong>Program</strong></p> <!-- <p><a href="activities.html" class="menu">Activities</a></p> --> <p><a href="registration.html" class="menu">Registration</a></p> <p><a href="workshops.html" class="menu">Workshops</a></p> <p><a href="travel.html" class="menu">Travel</a></p> <p><a href="accommodation.html" class="menu">Accommodation</a></p> <p><a href="stipends.html" class="menu">Student Grants</a></p> <p><a href="sponsorship.html" class="menu">Sponsorship</a></p> <p> <br></p> <p style="color:platinum" align="center"><br><i>Platinum Sponsors</i></p> <p align="center"><a href="https://blockstream.com" target="_blank"><img src="images/blockstream.png" alt="Blockstream" /></a></p> <p align="center"><a href="https://iohk.io" target="_blank"><img src="images/iohk.png" alt="IOHK" /></a></p> <p align="center"><a href="https://www.thales-esecurity.com/" target="_blank"><img src="images/thales.png" alt="Thales" /></a></p> <!-- <p>[INSERT IMAGE]</p> --> <p style="color:gold" align="center"><br><i>Gold Sponsors</i></p> <p align="center"><a href="http://cybersecurity.rohde-schwarz.com" target="_blank"><img src="images/RSCS.png" alt="Rohde&Schwarz" /></a></p> <p style="color:silver" align="center"><br><i>Silver Sponsors</i></p> <!-- <p align="center"><a href="http://atencoin.com/" target="_blank"><img src="images/aten.png" alt="Aten" /></a></p> <p align="center"><a href="https://gemini.com/" target="_blank"><img src="images/gemini.png" alt="Gemini" /></a></p> <p align="center"><a href="http://research.google.com" target="_blank"><img src="images/google.png" alt="Google" /></a></p> --> <p align="center"><a href="http://bit.ly/2ldE8Bm" target="_blank"><img src="images/cybers.gif" alt="OUP" /></a></p> <!-- <p align="center"><a href="http://www.sap.com/" target="_blank"><img src="images/sap.png" alt="SAP" /></a></p> --> <p align="center"><br><i>Sponsors in Kind</i></p> <p align="center"><a href="http://www.worldpay.com" target="_blank"><img src="images/worldpay.png" alt="Worldpay" /></a></p> <p align="center"><br><i>Student Support</i></p> <!-- <p align="center"><a href="http://www.nsf.gov/" target="_blank"><img src="images/nsf_logo.png" alt="NSF" /></a></p> --> <p align="center"><a href="http://www.onr.navy.mil/en/Science-Technology/ONR-Global.aspx" target="_blank"><img src="images/onrg.png" alt="ONR Global" /></a></p> </div> </td> <td class="content" width="500"> <div class="content"> <!-- START CONTENT --> <h2>Program</h2> <h3> <br /> Financial Cryptography and Data Security 2017 </h3> <p class="header"> <img src="images/logo-transparent.gif" width="276" height="99" alt="International Financial Cryptography Association logo" /></p> <h4> Twenty-First International Conference<br> April 3–7, 2017<br> <a href="http://thepalacemalta.com/" target="_blank">The Palace Hotel</a><br> Malta </h4> <!-- <p><center><em>Ross Anderson live-blogged FC17. You can read his excellent summaries of all presentations, including during the rump session, over at <a href="http://www.lightbluetouchpaper.org/2017/04/03/financial-cryptography-2017/">Light Blue Touchpaper</a>.</em></center></p> --> <!-- <p><center><em>Please note, this program is provisional and subject to change.</em></center></p> --> <table width="100%" cellspacing="2" cellpadding="2"> <tr> <td class="schedule" colspan="2"> All events take place in the Royal Hall at The Palace Hotel unless otherwise indicated.<br> </td> </tr> <tr><td></td></tr> <tr bgcolor="lightgrey"> <td class="schedule" colspan="2"> <font size="+1"><b>Sunday, April 2, 2017</b></font> </td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> </tr> <tr> <td class="schedule">16:00–18:00</td> <td><b>Registration Reception</b><br> Location: Alexandra Gardens / State Hall foyer<br> </td> </tr> <tr><td></td></tr> <tr><td></td></tr> <tr bgcolor="lightgrey"> <td class="schedule" colspan="2"> <font size="+1"><b>Monday, April 3, 2017</b></font> </td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">08:30–09:00</td> <td><em>Registration</em></td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">09:00–09:10</td> <td><em>Opening Remarks</em></td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule"><nobr>09:10–10:10</td> <td> <center><b>Session 1: Opening Keynote</b><br>Session Chair: Aggelos Kiayias <br><br>Silvio Micali<br>Massachusetts Institute of Technology</center><br><em>ALGORAND: A New Public Ledger</em> <p>A <em>public ledger</em> is a tamperproof sequence of data that can be read and augmented by <em>everyone</em>. Shared public ledgers stand to revolutionize the way a democratic society operates. They secure all kinds of traditional transactions—such as payments, asset transfers, titling—in the exact order in which they occur; and enable totally new transactions—such as cryptocurrencies and smart contracts. They can remove intermediaries and usher in a new paradigm for trust. As currently implemented, however, public ledgers cannot achieve their enormous potential.</p> <p><em>Algorand</em> is a quite alternative, truly democratic, and very efficient way to implement a public ledger. Unlike prior implementations based on <em>proof of work</em>, it requires a negligible amount of computation, and generates a transaction history that will not "fork" with overwhelmingly high probability.</p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">10:10–10:40</td> <td><em>Break</em></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">10:40–12:20</td> <td> <center><b>Session 2: Privacy and Identity Management</b><br>Session Chair: Moti Yung</center> <p>Sietse Ringers, Eric Verheul and Jaap-Henk Hoepman. <a href="preproceedings/paper_69.pdf"><em>An efficient self-blindable attribute-based credential scheme</em></a></p> <p>Sherman S. M. Chow, Haibin Zhang and Tao Zhang. <a href="preproceedings/paper_128.pdf"><em>Real Hidden Identity-Based Signatures</em></a></p> <p>Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan and Mohamed Ali Kaafar. <a href="preproceedings/paper_40.pdf"><em>BehavioCog: An Observation Resistant Authentication Scheme</em></a></p> <p>Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner and Anja Lehmann. <a href="preproceedings/paper_31.pdf"><em>Updatable Tokenization: Formal Definitions and Provably Secure Constructions</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">12:20–14:00</td> <td><em>Lunch</em><br>Location: The Tabloid<br></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">14:00–15:15</td> <td> <center><b>Session 3: Privacy and Data Processing</b><br>Session Chair: Dario Fiore</center> <p>Qian Wang, Kui Ren, Minxin Du and Aziz Mohaisen. <a href="preproceedings/paper_65-2.pdf"><em>SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates</em></a></p> <p>Gabriel Kaptchuk, Matthew Green and Aviel Rubin. <a href="preproceedings/paper_97.pdf"><em>Outsourcing Medical Dataset Analysis: A Possible Solution</em></a></p> <p>David Derler, Sebastian Ramacher and Daniel Slamanig. <a href="preproceedings/paper_14.pdf"><em>Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">15:15–15:45</td> <td><em>Break</em></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">15:45–17:25</td> <td> <center><b>Session 4: Cryptographic Primitives and API's</b><br>Session Chair: Stefan Dziembowski</center> <p>Anamaria Costache, Nigel P. Smart and Srinivas Vivek. <a href="preproceedings/paper_6.pdf"><em>Faster Homomorphic Evaluation of Discrete Fourier Transforms</em></a> (rescheduled from session 9)</p> <p>Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev. <a href="preproceedings/paper_47.pdf"><em>A Post-Quantum Digital Signature Scheme based on Supersingular Isogenies</em></a></p> <p>Helger Lipmaa. <a href="preproceedings/paper_104.pdf"><em>Optimally Sound Sigma Protocols Under DCRA</em></a></p> <p>Reihaneh Safavi-Naini, Viliam Lisy and Yvo Desmedt. <a href="preproceedings/paper_59-2.pdf"><em>Economically Optimal Variable Tag Length Authentication</em></a></p> </td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">19:00–21:30</td> <td><b>Welcome Reception and Poster Session</b> <em>(Sponsored by <a href="https://blockstream.com" target="_blank">Blockstream</a>)</em><br>Location: TemptAsian / Pool Deck<br> <p>Peter Todd and Harry Halpin. <em>OpenTimestamps: Securing Software Updates using the Bitcoin Blockchain</em></p> <p>Anirban Basu, Joshua Jeeson Daniel, Sushmita Ruj, Mohammad Shahriar Rahman, Theo Dimitrakos, and Shinsaku Kiyomoto. <em>Accountability and integrity for data management using blockchains</em></p> <!-- <p>Zhan Chen and Wenquan Bi. <em>11-Round Impossible Differential Attack on Midori64</em></p> --> <p>Mohammad Shahriar Rahman, Anirban Basu, and Shinsaku Kiyomoto. <em>Broker-mediated Trade Finance with Blockchains</em></p> <!-- <p>S. Matthew English, Ehsan Nezhadian. <em>Application of Bitcoin Data-Structures & Design Principles to Supply Chain Management</em></p> --> <p>Alexander Chepurnoy. <em>Σ-State Authentication Language, an Alternative to Bitcoin Script</em></p> <p>Niek J. Bouman, Martha E. Nikolaou and Bas van Schriek. <em>The Amount as a Predictor of Transaction Fraud</em></p> </td> </tr> <tr><td></td></tr> <tr><td></td></tr> <tr><td></td></tr> <tr bgcolor="lightgrey"> <td class="schedule" colspan="2"> <font size="+1"><b>Tuesday, April 4, 2017</b></font> </td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">09:00–10:15</td> <td> <center><b>Session 5: Vulnerabilities and Exploits, I</b><br>Session Chair: Ian Goldberg</center> <p>Ajaya Neupane, Md Lutfor Rahman and Nitesh Saxena. <a href="preproceedings/paper_57.pdf"><em>PEEP: Passively Eavesdropping Private Input via Brainwave Signals</em></a></p> <p>Michael Schwarz, Clémentine Maurice, Daniel Gruss and Stefan Mangard. <a href="preproceedings/paper_8.pdf"><em>Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript</em></a></p> <p>Gunnar Hartung. <a href="preproceedings/paper_9.pdf"><em>Attacks on Secure Logging Schemes</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">10:15–10:45</td> <td><em>Break</em></td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">10:45–12:40</td> <td> <center><b>Session 6: Blockchain Technology</b><br>Session Chair: Andrew Miller</center> <p>Steven Goldfeder, Joseph Bonneau, Rosario Gennaro and Arvind Narayanan. <a href="preproceedings/paper_122.pdf"><em>Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin</em></a></p> <p>Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros. <a href="preproceedings/paper_37.pdf"><em>TrustIsRisk: A Decentralized Financial Trust Platform</em></a></p> <p>Patrick McCorry, Siamak Shahandashti and Feng Hao. <a href="preproceedings/paper_80.pdf"><em>A Smart Contract for Boardroom Voting with Maximum Voter Privacy</em></a></p> <p>Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy and Sasha Ivanov. <a href="preproceedings/paper_34.pdf"><em>Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies</em></a></p> <p>Adem Efe Gencer, Robbert van Renesse, Emin Gün Sirer. <a href="preproceedings/paper_73.pdf"><em>Short Paper: Service-Oriented Sharding for Blockchains</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">15:00–19:30</td> <td><b>Excursion</b> <em>(Sponsored by <a href="https://iohk.io" target="_blank">IOHK</a>)</em> <p>Transfer to Valetta with classic Maltese buses, walking tour of the city, Upper Barrakka Gardens, private opening of St. John's Co-Cathedral, return to Sliema harbour by wooden gullet including on-board buffet.</p> <!-- <p><em>Note: the timing of the excursion might be changed, perhaps even last-minute depending on weather conditions, to leave immediately after the morning session and provide lunch at the beginning instead of dinner at the end. Please try to leave flexibility in your plans if you intend to participate.</p> --> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">20:30–21:30</td> <td><b>IFCA General Meeting</b><br> Location: Royal Hall<br> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">21:30–00:00</td> <td><b>Rump Session</b><br> Location: Royal Hall<br>Session Chair: Joe Bonneau</td> </tr> <tr><td></td></tr> <tr><td></td></tr> <tr><td></td></tr> <tr bgcolor="lightgrey"> <td class="schedule" colspan=2> <font size="+1"><b>Wednesday, April 5, 2017</b> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">09:00–09:50</td> <td> <center><b>Session 7: Security of Internet Protocols</b><br>Session Chair: Leo Reyzin</center> <p>Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner and Sharon Goldberg. <a href="preproceedings/paper_29.pdf"><em>The Security of NTP's Datagram Protocol</em></a></p> <p>Pawel Szalachowski, Adrian Perrig. <a href="preproceedings/paper_64.pdf"><em>Short Paper: On Deployment of DNS-based Security Enhancements</em></a></p> </td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule"><nobr>09:50–10:40</td> <td> <center><b>Session 8: Blind signatures</b><br>Session Chair: Kazue Sako</center> <p>Albrecht Petzoldt, Alan Szepieniec and Mohamed Saied Emam Mohamed. <a href="preproceedings/paper_66.pdf"><em>A Practical Multivariate Blind Signature Scheme</em></a></p> <p>Essam Ghadafi. <a href="preproceedings/paper_55.pdf"><em>Efficient Round-Optimal Blind Signatures in the Standard Model</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">10:40–11:10</td> <td><em>Break</em></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">11:10–12:25</td> <td> <center><b>Session 9: Searching and Processing Private Data</b><br>Session Chair: Rei Safavi-Naini</center> <p>Bernardo Portela, Manuel Barbosa, Guillaume Scerri, Bogdan Warinschi, Raad Bahmani, Ferdinand Brasser and Ahmad-Reza Sadeghi. <a href="preproceedings/paper_89.pdf"><em>Secure Multiparty Computation from SGX</em></a></p> <p>Wakaha Ogata and Kaoru Kurosawa. <a href="preproceedings/paper_22.pdf"><em>Efficient No-dictionary Verifiable SSE</em></a></p> <p>Ryan Stanley-Oakes. <a href="preproceedings/paper_25-2.pdf"><em>A Provably Secure PKCS#11 Configuration Without Authenticated Attributes</em></a> (rescheduled from session 4)</p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">12:25–14:00</td> <td><em>Lunch</em><br>Location: The Tabloid<br></td> </tr> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule"><nobr>14:00–15:30</td> <td> <center><b>Session 10: Secure Channel Protocols</b><br>Session Chair: Feng Hao</center> <p>Nayanamana Samarasinghe and Mohammad Mannan. <a href="preproceedings/paper_93.pdf"><em>Short Paper: TLS Ecosystems in Networked Devices vs Web Servers</em></a></p> <p>Yevgeniy Dodis and Dario Fiore. <a href="preproceedings/paper_78.pdf"><em>Unilaterally-Authenticated Key Exchange</em></a></p> <p>Karthikeyan Bhargavan, Antoine Delignat-Lavaud and Nadim Kobeissi. <a href="preproceedings/paper_15.pdf"><em>Formal Modeling and Verification for Domain Validation and ACME</em></a></p> <p>Tom Chothia, Flavio Garcia, Christopher Heppel and Christopher McMahon-Stone. <a href="preproceedings/paper_83-2.pdf"><em>Why Banker Bob (still) can't get TLS right: A Security Analysis of TLS in Leading UK Banking Apps</em></a></p> </td> </tr> <!-- <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">15:40</td> <td><em>Adjourn</em></td> </tr> --> <tr><td colspan="2"><hr></td></tr> <tr> <td class="schedule">18:00–22:00</td> <td><b>Maltese Evening</b> <em>(Sponsored by <a href="https://www.thales-esecurity.com/" target="_blank">Thales e-Security</a>)</em><br>Location: Bacchus Restaurant, Mdina <p>Transfer to the old capital of Mdina, short walking tour of the city followed by a buffet dinner of traditional Maltese specialties.</p> </td> </tr> <tr><td></td></tr> <tr><td></td></tr> <tr><td></td></tr> <tr bgcolor="lightgrey"> <td class="schedule" colspan=2> <font size="+1"><b>Thursday, April 6, 2017</b></font> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">09:00–09:50</td> <td> <center><b>Session 11: Privacy in Data Storage and Retrieval</b><br>Session Chair: Peter Ryan</center> <p>Cecylia Bocovich, John A. Doucette and Ian Goldberg. <a href="preproceedings/paper_19.pdf"><em>Lavinia: An audit-payment protocol for censorship-resistant storage</em></a></p> <p>Helger Lipmaa and Kateryna Pavlyk. <a href="preproceedings/paper_24.pdf"><em>A Simpler Rate-Optimal CPIR Protocol</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">09:50–10:45</td> <td> <center><b>Session 12: Vulnerabilities and Exploits, II</b><br>Session Chair: Ari Juels</center> <p>Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders and Ivan Martinovic. <a href="preproceedings/paper_17.pdf"><em>Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS</em></a></p> <p>Vincent Taylor and Ivan Martinovic. <a href="preproceedings/paper_45.pdf"><em>Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store</em></a></p> <p>Markus Jakobsson. <a href="preproceedings/paper_10-2.pdf"><em>Short Paper: Addressing Sophisticated Email Attacks</em></a></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">10:45–11:15</td> <td><em>Break</em></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">11:15–12:35</td> <td> <center><b>Session 13: Panel</b><br>Moderator: William Scannell<br>Panelists: Adam Back, Tiago Teles, Tarah Wheeler </center> <p><em>When Cash & Crypto Collide</em></p> <p> Fiat currencies around the world are beginning to transition to a purely digital form. One need look no further than Venezeula's move to demonetize their 100 bolivar bill; or India's 500 and 1000 rupee note demonetization. These are both clear signals that fiat currency is about to mean something very different in the coming decade. With a purely digital fiat currency, governments expect to expose black market monetary stockpiles, increase the number of participants in the banking system, and improve fiscal efficiency. There will of course be unintended side effects. As money ceases to have any form but ones and zeroes, the role of the security services providers guaranteeing the safe transmission of money around the world is going to increase.</p> <p>As currency is transmitted in the black box form of secure encrypted tokens, will security guarantors step into the role of monetary authorities?</p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">12:35–12:40</td> <td><em>Closing Remarks</em></td> </tr> <!-- <p>Marie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith and Tyler Moore. <a href="preproceedings/36_Vasek.pdf"><em>The Bitcoin Brain Drain: A Short Paper on the Use and Abuse of Bitcoin Brain Wallets</em></a> (Short Paper)</p> --> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">12:40–14:00</td> <td><em>Lunch</em><br>Location: The Tabloid<br></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">14:00–18:30</td> <td><b>Free Afternoon with Activities</b> <br>(sign-up sheets will be available) <p>A: Blue Grotto, Hagar Qim temples, Marsaxlokk fishing village</p> <p>B: Three Cities (walking tour), Dghasja cruise, Inquisitor's Palace</p> <p>C: Ta' Qali crafts village, Maria Rosa wine estate (including tasting)</p> <p>D: Harbour cruise (on your own, ticket provided)</p> <!-- <p>Hop-on Hop-off bus tour (on your own, ticket provided)</p> --> <!-- <ul style="list-style-type:disc"> <li>Mount Gay Rum Tour -- depart 2pm, return by 6pm <li>Harrison's Cave Tour -- depart 2pm, return by 6pm <li>Catamaran Sail and Snorkel -- depart 2:30pm, return by 7pm <li>Scuba Dive -- depart 1pm, return by 6pm </ul> --> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">19:00–21:00</td> <td><b>Workshop Reception</b> (for workshop registrants)<br> Location: Alexandra Gardens / State Hall foyer<br> </td> </tr> <tr><td></td></tr> <tr><td></td></tr> <tr><td></td></tr> <tr bgcolor="lightgrey"> <td class="schedule" colspan=2> <font size="+1"><b>Friday, April 7, 2017</b></font> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">09:00–12:30</td> <td> <center><b>Morning Workshops</b></center> <p><em>Note: the timing of the lunch and breaks is coordinated among all of the workshops, but some workshops might start earlier in the morning or end later in the afternoon. See their individual programs for details. Workshop registrants can attend any of the workshops and can switch between them as desired.</em></p> <p><b>BITCOIN'17</b>: <a href ="bitcoin/" target="_blank">4th Workshop on Bitcoin and Blockchain Research</a><br>Location: State Hall</p> <p><b>TA'17</b>: <a href="https://www.agari.com/targeted-attacks-2017/" target="_blank">1st Workshop on Targeted Attacks</a><br>Location: Royal Hall Part 2<br>Invited Talk: John Wilson. <em>Social Engineering the Social Engineer</em></p> <p><b>VOTING'17</b>: <a href ="voting/" target="_blank">2nd Workshop on Advances in Secure Electronic Voting Schemes</a><br>Location: Royal Hall Part 1<br>Keynote: Philip Stark. <em>Sometimes, a Paper Trail Isn't Worth the Paper It's Printed on</em></p> <p><b>WAHC'17</b>: <a href="https://www.dcsec.uni-hannover.de/wahc17" target="_blank">5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography</a><br>Location: Palazzo Capua<br>Invited Talks: Kim Laine. <em>Microsoft's Homomorphic SEAL Library</em>; and Yuriy Polyakov. <em>The PALISADE Project</em></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">10:30–11:00</td> <td><em>Break</em></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">12:30–14:00</td> <td><em>Lunch</em><br>Location: The Tabloid<br></td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">14:00–17:30</td> <td> <center><b>Afternoon Workshops</b></center> <p><b>BITCOIN'17</b> (continued): <a href ="bitcoin/" target="_blank">4th Workshop on Bitcoin and Blockchain Research</a><br>Location: State Hall</p> <p><b>VOTING'17</b> (continued): <a href ="voting/" target="_blank">2nd Workshop on Advances in Secure Electronic Voting Schemes</a><br>Location: Royal Hall Part 1</p> <p><b>WAHC'17</b> (continued): <a href="https://www.dcsec.uni-hannover.de/wahc17" target="_blank">5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography</a><br>Location: Palazzo Capua</p> <p><b>WTSC'17</b>: <a href ="wtsc/" target="_blank">1st Workshop on Trusted Smart Contracts</a><br>Location: Royal Hall Part 2<br>Invited Speaker: Vitalik Buterin. <em>Blockchain and Smart Contract Mechanism Design Challenges</em></p> </td> </tr> <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">15:00–15:30</td> <td><em>Break</em> (note revised time!)</td> </tr> <!-- <tr><td colspan=2><hr></td></tr> <tr> <td class="schedule">18:45–22:00</td> <td><b>Oistins Fish Fry</b> (for workshop registrants)</td> </tr> --> </table> <p> </p> <p> </p> <p> </p> <p>This conference is organized annually by the <a href="http://ifca.ai/">International Financial Cryptography Association</a>.</p> <!-- END CONTENT --> </div> </td> </tr> </table> <br> </div> </body> </html>