10:00 to 10:10 | Welcome and Introduction |
Jane Leeks (Newton Gateway to Mathematics) Nick Easton (BAE Systems) |
||
10:10 to 10:40 | Signals Intelligence Before Bletchley Park | Tony Comer (GCHQ) | ||
10:40 to 11:10 | Learning with Errors: Post-Quantum Candidates from Noisy Linear Systems | Martin Albrecht (Royal Holloway, University of London) | ||
11:10 to 11:40 | Physical Unclonable Functions for Lightweight Crytography Solutions | Maire O'Neill (Queen's University Belfast) | ||
11:40 to 11:55 | Tea and Coffee | |||
11:55 to 12:25 | Crytographically Verified Protocol Implementations | Cedric Fournet (Microsoft (UK)), (Microsoft (UK)) | ||
12:25 to 13:10 | Beyond Secure Channels: Cryptography for Privacy, Anonymity and Digital Currencies | George Danezis (Microsoft (UK)) | ||
13:10 to 14:00 | Lunch | |||
14:00 to 14:30 | Cryptography for Embedded Systems | Elisabeth Oswald (University of Bristol) | ||
14:30 to 15:00 | Computing on Encrypted Data | Nigel Smart (KU Leuven) | ||
15:00 to 15:45 | Protocol Cryptanalysis and Cryptography Industry Standards | Kenny Paterson (Birkbeck, University of London) | ||
15:45 to 16:00 | Tea and Coffee | |||
16:00 to 16:30 | Facilitated Discussion and Questions | |||
16:30 to 17:30 | Tour of Bletchley Park |