6:57 ** Day 2 Opening ** 7:18 ** Session 1: Credentials and Signatures ** 7:18 EU Digital Identity and Anonymous Credentials - A Happy End? 27:18 What Happened to the ZK Dream? 42:49 Anonymous credentials from ECDSA 57:55 Stronger Privacy for Existing Credentials 1:13:46 Zero-knowledge Proofs for Legacy Signatures 1:29:52 Bonus lightning talk 1:59:37 ** Session 2: PQ Deployment ** 1:59:52 Field Experiments on Post-Quantum DNSSEC 2:19:16 Post-quantum Cryptographic Analysis of SSH 2:34:22 Kemeleon: Elligator-like Obfuscation for Post-Quantum Cryptography 2:54:47 Using Formally Verified Post-Quantum Algorithms at Scale 4:39:39 ** Session 3: Web PKI and Open Source ** 4:39:39 Invited Talk: Let’s Encrypt: Ten Years Encrypting the Web 5:09:14 How to Properly Open Source Code: Lessons Learned from the Linux Foundation 5:25:10 Toward revocation checking that works 5:46:04 Auditing Key Transparency 6:29:50 ** Session 4: Side-Channels ** 6:29:50 Stealing Cryptographic Keys with Weird Gates 6:50:32 Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures 7:10:08 Is Your Bluetooth Chip Leaking Secrets via RF Signals? 7:25:58 Cache Timing Leakages in Zero-Knowledge Protocols 7:42:18 EUCLEAK 7:58:29 I know what your compiler did: Optimization Effects on Power Side-Channel Leakage for RISC-V 8:19:05 ** Closing **
10
Top is selected, so you'll see featured comments