<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jefferson&#039;s Wheel &#187; Secure Computation</title>
	<atom:link href="http://www.jeffersonswheel.org/category/secure-computation/feed" rel="self" type="application/rss+xml" />
	<link>https://www.jeffersonswheel.org</link>
	<description>Security Research at the University of Virginia</description>
	<lastBuildDate>Sun, 14 Oct 2018 03:12:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>SRG at USENIX Security 2017</title>
		<link>https://www.jeffersonswheel.org/2017/srg-at-usenix-security-2017</link>
		<comments>https://www.jeffersonswheel.org/2017/srg-at-usenix-security-2017#comments</comments>
		<pubDate>Sun, 13 Aug 2017 02:42:14 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Adversarial Machine Learning]]></category>
		<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Pictures]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>
		<category><![CDATA[Web Security]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=803</guid>
		<description><![CDATA[Several SRG students presented posters at USENIX Security Symposium in Vancouver, BC. Approaches to Evading Windows PE Malware Classifiers Anant Kharkar, Helen Simecek, Weilin Xu, David Evans, and Hyrum S. Anderson (Endgame) JSPolicy: Policied Sandboxes for Untrusted Third-Party JavaScript Ethan Lowman and David Evans EvadeML-Zoo: A Benchmarking and Visualization Tool for Adversarial Machine Learning Weilin [...]]]></description>
				<content:encoded><![CDATA[<p>Several SRG students presented posters at <a href="https://www.usenix.org/conference/usenixsecurity17/poster-session">USENIX Security Symposium</a> in Vancouver, BC.</p>
<table>
<tr>
<td valign="top">
<a href="/images/usenix2017/helen-anant-poster.jpg"><img src="/images/usenix2017/helen-anant-poster.jpg" height="250"></a><br />
<em>Approaches to Evading Windows PE Malware Classifiers</em><br />
Anant Kharkar, Helen Simecek, Weilin Xu, David Evans, and Hyrum S. Anderson (Endgame)
</td>
<td valign="top">
<a href="/images/usenix2017/ethan-poster.jpg"><img src="/images/usenix2017/ethan-poster.jpg" height="250"></a><br />
<em>JSPolicy: Policied Sandboxes for Untrusted Third-Party JavaScript</em><br />
Ethan Lowman and David Evans
</td>
</tr>
<tr>
<td valign="top">
<a href="/images/usenix2017/weilin-poster.jpg"><img src="/images/usenix2017/weilin-poster.jpg" height="250"></a>
</td>
<td valign="top">
<a href="/images/usenix2017/noah-poster.jpg"><img src="/images/usenix2017/noah-poster.jpg" height="250"></a>
</td>
</tr>
<tr>
<td colspan=2 align="center">
<a href="https://evademl.org/zoo"><em>EvadeML-Zoo: A Benchmarking and Visualization Tool for Adversarial Machine Learning</em></a><br />
Weilin Xu, Andrew Norton, Noah Kim, Yanjun Qi, and David Evans
</td>
</tr>
<tr>
<td colspan=2 align="center">
<a href="https://oblivc.org/dca"><em>Decentralized Certificate Authorities</em></a><br />
Hannah Li, Bargav Jayaraman, and David Evans
</td>
</tr>
</table>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2017/srg-at-usenix-security-2017/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Secure Multi-Party Computation: Promises, Protocols, and Practicalities</title>
		<link>https://www.jeffersonswheel.org/2017/secure-multi-party-computation-promises-protocols-and-practicalities</link>
		<comments>https://www.jeffersonswheel.org/2017/secure-multi-party-computation-promises-protocols-and-practicalities#comments</comments>
		<pubDate>Tue, 27 Jun 2017 16:36:01 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>
		<category><![CDATA[Talks]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=783</guid>
		<description><![CDATA[I gave a talk at ECRYPT NET: Workshop on Crypto for the Cloud &#038; Implementation (which was combined with Paris Crypto Day) on our group&#8217;s work on secure multi-party computation, using Bargav Jayaraman and Hannah Li&#8216;s recent work on decentralizing certificate authorities as a motivating application.]]></description>
				<content:encoded><![CDATA[<p>I gave a talk at <a href="http://crypto-events.di.ens.fr/ecryptnet/">ECRYPT NET: Workshop on Crypto for the Cloud &#038; Implementation</a> (which was combined with <a href="https://pariscryptoday.github.io/">Paris Crypto Day</a>) on our group&#8217;s work on secure multi-party computation, using <a href="https://bargavjayaraman.github.io/">Bargav Jayaraman</a> and <a href="https://github.com/HainaLi">Hannah Li</a>&#8216;s recent work on <a href="https://oblivc.org/dca">decentralizing certificate authorities</a> as a motivating application.</p>
<p><center><br />
<script async class="speakerdeck-embed" data-id="641bb7600e7c478598f142ec476a7ee9" data-ratio="1.77777777777778" src="//speakerdeck.com/assets/embed.js"></script><br />
</center></p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2017/secure-multi-party-computation-promises-protocols-and-practicalities/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Growth of MPC Research</title>
		<link>https://www.jeffersonswheel.org/2017/growth-of-mpc-research</link>
		<comments>https://www.jeffersonswheel.org/2017/growth-of-mpc-research#comments</comments>
		<pubDate>Fri, 13 Jan 2017 21:50:36 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Papers]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=757</guid>
		<description><![CDATA[I led a discussion breakout at the NSF SaTC PIs meeting on Secure Computation: Progress, Methods, Challenges, and Open Questions. To set up the session, I looked at the number of papers in Google scholar that match "secure computation" OR "multi-party computation" (which seems like a fairly good measure of research activity in the area): [...]]]></description>
				<content:encoded><![CDATA[<p>I led a discussion breakout at the <a href="http://cps-vo.org/group/satc-pi-meeting-17">NSF SaTC PIs meeting</a> on <em>Secure Computation: Progress, Methods, Challenges, and Open Questions</em>. To set up the session, I looked at the number of papers in Google scholar that match <tt>"secure computation" OR "multi-party computation"</tt> (which seems like a fairly good measure of research activity in the area):</p>
<p><center><img width=600 src="/images/mpcpapers.png"></center></p>
<p>There were 1800 MPC papers published in 2015!  This means in one year, there are most papers published on MPC than there were from the beginning of time through the end of 2004.  Gotta get reading&#8230;</p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2017/growth-of-mpc-research/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Aggregating Private Sparse Learning Models Using Multi-Party Computation</title>
		<link>https://www.jeffersonswheel.org/2016/aggregating-private-sparse-learning-models-using-multi-party-computation</link>
		<comments>https://www.jeffersonswheel.org/2016/aggregating-private-sparse-learning-models-using-multi-party-computation#comments</comments>
		<pubDate>Fri, 09 Dec 2016 18:43:31 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Alumni]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=749</guid>
		<description><![CDATA[Bargav Jayaraman presented on privacy-preserving sparse learning at the Private Multi‑Party Machine Learning workshop attached to NIPS 2016 in Barcelona. A short paper summarizing the work is: Lu Tian, Bargav Jayaraman, Quanquan Gu, and David Evans. Aggregating Private Sparse Learning Models Using Multi-Party Computation [PDF, 6 pages]. At the workshop, Jack Doerner also presented a [...]]]></description>
				<content:encoded><![CDATA[<p>Bargav Jayaraman presented on <a href="https://oblivc.org/ppml">privacy-preserving sparse learning</a> at the <a href="https://pmpml.github.io/PMPML16/">Private Multi‑Party Machine Learning</a> workshop attached to NIPS 2016 in Barcelona.</p>
<p><center><br />
<img src="https://oblivc.org/images/mpcaggregation.png" width=700><br />
</center></p>
<p>A short paper summarizing the work is: Lu Tian, Bargav Jayaraman, Quanquan Gu, and David Evans. <a href="http://oblivc.org/docs/pmpml.pdf"><em>Aggregating Private Sparse Learning Models Using Multi-Party Computation</em></a> [<a href="https://oblivc.org/docs/pmpml.pdf">PDF</a>, 6 pages].</p>
<p>At the workshop, Jack Doerner also presented a talk on <a href="https://pmpml.github.io/PMPML16/slides/doerner.pdf"><em>An Introduction to Practical Multiparty Computation</em></a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/aggregating-private-sparse-learning-models-using-multi-party-computation/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Secure Stable Matching at Scale</title>
		<link>https://www.jeffersonswheel.org/2016/secure-stable-matching-at-scale</link>
		<comments>https://www.jeffersonswheel.org/2016/secure-stable-matching-at-scale#comments</comments>
		<pubDate>Wed, 31 Aug 2016 00:32:50 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Papers]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=735</guid>
		<description><![CDATA[Our paper on secure stable matching is now available [PDF, 12 pages]: Jack Doerner, David Evans, abhi shelat. Secure Stable Matching at Scale. 23rd ACM Conference on Computer and Communications Security (CCS). Vienna, Austria. 24-28 October 2016. See the OblivC.org site for the code and data. Jack Doerner will present the paper at CCS in [...]]]></description>
				<content:encoded><![CDATA[<p>Our paper on secure stable matching is now available [<a href="http://oblivc.org/docs/matching.pdf">PDF</a>, 12 pages]:</p>
<p>Jack Doerner, David Evans, abhi shelat. <em>Secure Stable Matching at Scale</em>.  <a href="https://www.sigsac.org/ccs/CCS2016/"><em>23<sup>rd</sup> ACM Conference on Computer and Communications Security</em></a> (CCS). Vienna, Austria. 24-28 October 2016.</p>
<p>See the <a href="http://oblivc.org/matching">OblivC.org</a> site for the code and data.  Jack Doerner will present the paper at CCS in October.</p>
<p><center><br />
<b>Abstract</b><br />
</center></p>
<p>When a group of individuals and organizations wish to compute a <em>stable matching</em> &mdash; for example, when medical students are matched to medical residency programs &mdash; they often outsource the computation to a trusted arbiter to preserve the privacy of participants&#8217; preference rankings. Secure multi-party computation presents an alternative that offers the possibility of private matching processes that do not rely on any common trusted third party. However, stable matching algorithms are computationally intensive and involve complex data-dependent memory access patterns, so they have previously been considered infeasible for execution in a secure multiparty context on non-trivial inputs.</p>
<p>We adapt the classic Gale-Shapley algorithm for use in such a context, and show experimentally that our modifications yield a lower asymptotic complexity and more than an order of magnitude in practical cost improvement over previous techniques. Our main insights are to design new oblivious data structures that exploit the properties of the matching algorithms. We then apply our secure computation techniques to the instability chaining algorithm of Roth and Peranson, currently in use by the National Resident Matching Program. The resulting algorithm is efficient enough to be useful at the scale required for matching medical residents nationwide, taking just over 17 hours to complete an execution simulating the 2016 NRMP match with more than 35,000 participants and 30,000 residency slots.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/secure-stable-matching-at-scale/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>FTC Visit</title>
		<link>https://www.jeffersonswheel.org/2016/ftc-visit</link>
		<comments>https://www.jeffersonswheel.org/2016/ftc-visit#comments</comments>
		<pubDate>Fri, 19 Aug 2016 00:38:08 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Alumni]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>
		<category><![CDATA[Talks]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=738</guid>
		<description><![CDATA[Great to visit our former student Joseph Calandrino at the Federal Trade Commission in DC, where he is now a Research Director. Denis Nekipelov and I gave a joint talk there about using secure multi-party computation techniques to enable data analyses across sensitive, divided data sets in the room where the FTC commissioners meet. Denis [...]]]></description>
				<content:encoded><![CDATA[<p>Great to visit our former student Joseph Calandrino at the Federal Trade Commission in DC, where he is now a Research Director.</p>
<p>Denis Nekipelov and I gave a joint talk there about using secure multi-party computation techniques to enable data analyses across sensitive, divided data sets in the room where the FTC commissioners meet.</p>
<p><center><br />
<a href="//www.cs.virginia.edu/~evans/pictures/ftc-visit-2016.jpg"><img src="//www.cs.virginia.edu/~evans/pictures/ftc-visit-2016.jpg" width=650></a><br />
Denis Nekipelov, Joseph Calandrino, David Evans, Devesh Ravel<br />
</center></p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/ftc-visit/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ShanghaiTech Symposium</title>
		<link>https://www.jeffersonswheel.org/2016/shanghaitech-symposium</link>
		<comments>https://www.jeffersonswheel.org/2016/shanghaitech-symposium#comments</comments>
		<pubDate>Sun, 26 Jun 2016 00:11:25 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Alumni]]></category>
		<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>
		<category><![CDATA[Talks]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=710</guid>
		<description><![CDATA[I went to Shanghai for the ShanghaiTech Symposium on Information Science and Technology. ShanghaiTech was only founded three years ago, but has made tremendous progress and recruited a talented group of faculty and students. Zheng Zhang and Haibo Chen Hao Bai For the Symposium, I presented a tutorial introduction to secure multi-party computation (focused towards [...]]]></description>
				<content:encoded><![CDATA[<p>I went to Shanghai for the <a href="http://ssist2016.shanghaitech.edu.cn/index.html">ShanghaiTech Symposium on Information Science and Technology</a>.  ShanghaiTech was only founded three years ago, but has made tremendous progress and recruited a talented group of faculty and students.</p>
<table>
<tr>
<td width="50%" align="center" valign="top">
<img src="//www.jeffersonswheel.org/images/shanghaihaibo.jpg" height=400><br />
Zheng Zhang and Haibo Chen
</td>
<td width="50%" align="center" valign="top">
<a href="//www.jeffersonswheel.org/images/shanghaihaobai.jpg" border=0><img src="//www.jeffersonswheel.org/images/shanghaihaobai.jpg" height=400></a><br />
Hao Bai
</td>
</tr>
</table>
<p>For the Symposium, I presented a tutorial <a href="http://ssist2016.shanghaitech.edu.cn/speakers.html#evans">introduction to secure multi-party computation</a> (focused towards systems researchers), and an invited talk on <em>Memory for Data-Oblivious Computation</em>.  Was a special honor to be able to speak about MPC applications build using Yao&#8217;s protocol following Andrew Yao&#8217;s opening keynote.</p>
<p><script async class="speakerdeck-embed" data-id="b0bb7d07699d4a9dbf5bb29590f92fab" data-ratio="2.0" src="//speakerdeck.com/assets/embed.js"></script></p>
<p><script async class="speakerdeck-embed" data-id="a3b5fac297fb4b8da10cea4c8ed34d43" data-ratio="2.43809523809524" src="//speakerdeck.com/assets/embed.js"></script></p>
<p>Thanks a bunch to <a href="http://sist.shanghaitech.edu.cn/StaffDetail.asp?id=374">Hao Chen</a> for inviting me to the Symposium!</p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/shanghaitech-symposium/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Aarhus Workshop on Theory and Practice of Secure Multiparty Computation</title>
		<link>https://www.jeffersonswheel.org/2016/aarhus-workshop-on-theory-and-practice-of-secure-multiparty-computation</link>
		<comments>https://www.jeffersonswheel.org/2016/aarhus-workshop-on-theory-and-practice-of-secure-multiparty-computation#comments</comments>
		<pubDate>Sun, 05 Jun 2016 23:45:11 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>
		<category><![CDATA[Talks]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=706</guid>
		<description><![CDATA[I&#8217;m back from the Workshop on Theory and Practice of Secure Multiparty Computation are Aarhus University in Denmark. Aarhus is a great city for biking &#8211; you can rent bikes (with trailers for children), and bike down the coast from the old city, past the beach, and to the countryside, all on a bikes-only roadway. [...]]]></description>
				<content:encoded><![CDATA[<p>I&#8217;m back from the <a href="http://ctic.au.dk/events/workshops-conferences/mpc-2016/">Workshop on Theory and Practice of Secure Multiparty Computation</a> are Aarhus University in Denmark.  Aarhus is a great city for biking &#8211; you can rent bikes (with trailers for children), and bike down the coast from the old city, past the beach, and to the countryside, all on a bikes-only roadway.</p>
<p>Highlight of the workshop was unquestionably the musical performance by Ivan Damgård, Claudio Orlandi, and Marcel Keller:<br />
<center><br />
<a href="//www.jeffersonswheel.org/images/aarhussong.jpg" border=0><img src="//www.jeffersonswheel.org/images/aarhussong.jpg" width="85%"></a><br />
</center></p>
<p>I gave a talk on circuit structures and <a href="//www.oblivc.org/sqoram">Square-Root ORAM</a>:<br />
<center><script async class="speakerdeck-embed" data-id="842b989ea55944eab157702bbb71a5fb" data-ratio="1.77777777777778" src="//speakerdeck.com/assets/embed.js"></script></center></p>
<p>abhi shelat also presented on Jack Doerner&#8217;s work on <a href="https://www.oblivc.org/matching">private stable matching</a>.<br />
<center><br />
<a href="https://plus.google.com/photos/114975801512009922265/albums/6295487995681655937?authkey=CI-AkufS7N23Iw"><br />
<img src="https://lh3.googleusercontent.com/-bW2WYG56Llg/V14Q-j78t3I/AAAAAAABJ4g/jxfPMohKKa48IZIedp4pQxL5ljq-TysUACL0B/w2065-h1285-no/2016-06-04%2B14.59.26-7.jpg" width="85%"></a><br />
</center><br />
After the workshop, we had a family visit to Legoland (about an hour by train and bus from Aarhus). Photo albums: <a href="https://plus.google.com/photos/114975801512009922265/albums/6295477462614588017?authkey=CLmeroWwnOPj4wE">Aarhus</a>, <a href="https://plus.google.com/photos/114975801512009922265/albums/6295487995681655937?authkey=CI-AkufS7N23Iw">Legoland</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/aarhus-workshop-on-theory-and-practice-of-secure-multiparty-computation/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SRG at Oakland 2016</title>
		<link>https://www.jeffersonswheel.org/2016/srg-at-oakland-2016</link>
		<comments>https://www.jeffersonswheel.org/2016/srg-at-oakland-2016#comments</comments>
		<pubDate>Thu, 26 May 2016 00:53:07 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Conferences]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=717</guid>
		<description><![CDATA[At the IEEE Symposium on Security and Privacy in San Jose, CA, Samee Zahur presented on Square-Root ORAM and Anant, Jack, and Sam presented posters. Anant Kharkar Evading Web Malware Classifiers using Genetic Programming Jack Doerner Secure Gale-Shapley: Efficient Stable Matching for Multi-Party Computation Samuel Havron Secure Multi-Party Computation as a Tool for Privacy-Preserving Data [...]]]></description>
				<content:encoded><![CDATA[<p>At the <a href="http://www.ieee-security.org/TC/SP2016/program-posters.html"><em>IEEE Symposium on Security and Privacy</em></a> in San Jose, CA, Samee Zahur presented on <a href="https://www.oblivc.org/sqoram/">Square-Root ORAM</a> and Anant, Jack, and Sam presented posters.<br />
<center></p>
<table>
<tr>
<td align=center>
<a href="//www.jeffersonswheel.org/images/anant.jpg" border=0><br />
<img src="//www.jeffersonswheel.org/images/anant.jpg" width=500><br />
Anant Kharkar<br />
<a href="http://www.ieee-security.org/TC/SP2016/poster-abstracts/29-poster_abstract.pdf"><em>Evading Web Malware Classifiers using Genetic Programming</em></a>
</td>
</tr>
<tr>
<td align=center>
<a href="//www.jeffersonswheel.org/images/jack.jpg" border=0><br />
<img src="//www.jeffersonswheel.org/images/jack.jpg" width=500><br />
Jack Doerner<br />
<a href="http://www.ieee-security.org/TC/SP2016/poster-abstracts/37-poster_abstract.pdf"><em>Secure Gale-Shapley: Efficient Stable Matching for Multi-Party Computation</em></a>
</td>
</tr>
<tr>
<td align=center>
<a href="//www.jeffersonswheel.org/images/sam.jpg" border=0><br />
<img src="//www.jeffersonswheel.org/images/sam.jpg" width=500><br />
Samuel Havron<br />
<a href="http://www.ieee-security.org/TC/SP2016/poster-abstracts/38-poster_abstract.pdf"><em>Secure Multi-Party Computation as a Tool for Privacy-Preserving Data Analysis</em></a>
</td>
</tr>
</table>
<p></center></p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/srg-at-oakland-2016/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Summer School at Notre Dame</title>
		<link>https://www.jeffersonswheel.org/2016/summer-school-at-notre-dame</link>
		<comments>https://www.jeffersonswheel.org/2016/summer-school-at-notre-dame#comments</comments>
		<pubDate>Fri, 13 May 2016 18:02:01 +0000</pubDate>
		<dc:creator>David Evans</dc:creator>
				<category><![CDATA[Alumni]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[Secure Computation]]></category>
		<category><![CDATA[Talks]]></category>
		<category><![CDATA[Teaching]]></category>

		<guid isPermaLink="false">https://www.jeffersonswheel.org/?p=700</guid>
		<description><![CDATA[I presented two tutorials on oblivious computation at Notre Dame&#8217;s Summer School on Secure and Oblivious Computation and Outsourcing. SRG PhD Yan Huang, now at Indiana University, was one of the other tutorial presenters. I also learned a lot about verifiable computation and argument systems from Justin Thaler. Thanks to Marina Blanton for organizing a [...]]]></description>
				<content:encoded><![CDATA[<p>I presented two tutorials on oblivious computation at Notre Dame&#8217;s <a href="http://www3.nd.edu/~mblanton/summer-school-2016.html">Summer School on Secure and Oblivious Computation and Outsourcing</a>. SRG PhD <a href="http://homes.soic.indiana.edu/yh33/">Yan Huang</a>, now at Indiana University, was one of the other tutorial presenters.  I also learned a lot about verifiable computation and argument systems from <a href="http://people.seas.harvard.edu/~jthaler/">Justin Thaler</a>. Thanks to <a href="http://www.nd.edu/~mblanton/">Marina Blanton</a> for organizing a great summer school!</p>
<p>Slides for my tutorials on garbling techniques and memory for data oblivious computation are below.<br />
<center><br />
<script async class="speakerdeck-embed" data-id="d4e682efa0dc4128bd6d24fe9b0a7d7b" data-ratio="1.77777777777778" src="//speakerdeck.com/assets/embed.js"></script></center></p>
<p><center><br />
<script async class="speakerdeck-embed" data-id="c13dd125e5d24bb6bdff8bd65f8d9590" data-ratio="1.77777777777778" src="//speakerdeck.com/assets/embed.js"></script><br />
</center></p>
]]></content:encoded>
			<wfw:commentRss>https://www.jeffersonswheel.org/2016/summer-school-at-notre-dame/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
