13. ACNS 2015: New York, NY, USA

Secure Computation I: Primitives and New Models

Public Key Cryptographic Primitives

Secure Computation II: Applications

Anonymity and Related Applications

Cryptanalysis and Attacks (Symmetric Crypto)

Privacy and Policy Enforcement

Authentication via Eye Tracking and Proofs of Proximity

Malware Analysis and Side Channel Attacks

Side Channel Countermeasures and Tamper Resistance/PUFs

Leakage Resilience and Pseudorandomness