Mon, July 7 | Tue, July 8 | Wed, July 9 | Thu, July 10 | Fri, July 11 | |
Morning | Lattice assumptions, Ajtai’s hash function | Commitments, Signatures | Public-key encryption, Deep-dive on NIST standardized schemes | Laconic encryption, Functional encryption | Hack Day |
Afternoon | Concrete hardness of lattice problems, Fast implementations | Credentials, Proof systems | Fully homomorphic encryption | Obfuscation, Correlation-intractable hash functions | Hack Day |
Evening | Reception | Social dinner |