skip to content

 

 

15th June 2016
10:00 to 10:10 Welcome and Introduction Jane Leeks (Newton Gateway to Mathematics)
Nick Easton (BAE Systems)
10:10 to 10:40 Signals Intelligence Before Bletchley Park Tony Comer (GCHQ)
10:40 to 11:10 Learning with Errors: Post-Quantum Candidates from Noisy Linear Systems Martin Albrecht (Royal Holloway, University of London)
11:10 to 11:40 Physical Unclonable Functions for Lightweight Crytography Solutions Maire O'Neill (Queen's University Belfast)
11:40 to 11:55 Tea and Coffee
11:55 to 12:25 Crytographically Verified Protocol Implementations Cedric Fournet (Microsoft (UK)), (Microsoft (UK))
12:25 to 13:10 Beyond Secure Channels: Cryptography for Privacy, Anonymity and Digital Currencies George Danezis (Microsoft (UK))
13:10 to 14:00 Lunch
14:00 to 14:30 Cryptography for Embedded Systems Elisabeth Oswald (University of Bristol)
14:30 to 15:00 Computing on Encrypted Data Nigel Smart (KU Leuven)
15:00 to 15:45 Protocol Cryptanalysis and Cryptography Industry Standards Kenny Paterson (Birkbeck, University of London)
15:45 to 16:00 Tea and Coffee
16:00 to 16:30 Facilitated Discussion and Questions
16:30 to 17:30 Tour of Bletchley Park