<node id="72820">
  <nid>72820</nid>
  <type>event</type>
  <uid>
    <user id="27263"><![CDATA[27263]]></user>
  </uid>
  <created>1321445166</created>
  <changed>1475891797</changed>
  <title><![CDATA[ARC Colloquium: Yael Kalai, Microsoft]]></title>
  <body><![CDATA[<p>Abstract:</p><p>A *secret key* in cryptography is supposed to be just that -- something that is kept completely secret.&nbsp; However, there is a growing realization that in reality a secret key is not totally secret, as a variety of so-called "side channel" attacks can uncover some information about the secret key, such as some of its bits.&nbsp;&nbsp; <br />&nbsp;<br />In this talk, I will survey some recent results on cryptographic primitives that are provably secure even with keys which may be partly compromised. I will focus on a recent joint work with Zvika Brakerski, Jonathan Katz, and Vinod Vaikuntanathan, which shows how to construct cryptographic schemes that are secure against ``continual&nbsp;leakage''.</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Cryptography with Leaky Keys]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2010-10-11T14:30:00-04:00]]></value>
      <value2><![CDATA[2010-10-11T14:30:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p>Elizabeth Ndongi</p>]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>70263</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[ARC]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
