•  About
    • About the Lab
    • Director’s Note
    • Our Vision
    • Founding Donor
    • Advisory Board
    • Principal Investigators
  • People
    • Associated Faculty
    • Executive Committee
    • Students
    • Program Directorate
  • TrustNet
  •  Projects
  •  Resources
  •  News
    • Newsletter
    • Quick Updates
  •  Events
    • Talks
    • Trust Summit
    • TL CTF
    • All Events
  •  Engage
Menu
  •  About
    • About the Lab
    • Director’s Note
    • Our Vision
    • Founding Donor
    • Advisory Board
    • Principal Investigators
  • People
    • Associated Faculty
    • Executive Committee
    • Students
    • Program Directorate
  • TrustNet
  •  Projects
  •  Resources
  •  News
    • Newsletter
    • Quick Updates
  •  Events
    • Talks
    • Trust Summit
    • TL CTF
    • All Events
  •  Engage

Talks

Securing Processors against Side-Channel Attacks: CPU Caches, Schedulers and Beyond!
Gururaj Saileshwar
The Robustness of Blockchains to Network Delays
Suryanarayana Sankagiri
Towards Verified Trusted Computing Platforms with UCLID5
Sanjit A. Seshia
Differentially Private Community Detection over Stochastic Block Models
Ravi Tandon
zkSaaS: Zero-Knowledge SNARKs as a Service
Sruthi Sekar
Batch Proofs are Statistically Hiding
Chethan Kamath
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra
Layered MPC
Varun Narayanan
Incompressible Encryption
Mahesh Sreekumar Rajasree
Trustworthiness of Systems
Sundeep Oberoi
Artificial Intelligence: The path towards responsible governance
Cristina Vanberghen
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications
Arpita Patra
Geometry of Secure Computation
Hemanta Maji
End-to-End Secure Messaging with Traceability Only for Illegal Content
Guru Vamsi Policharla
Errors and Correction in Cumulative Knowledge
Madhu Sudan
Time-Space Tradeoffs for Collisions in Hash Functions
Akshima
Open and Permissionless Blockchains - A Swiss Perspective
Felix Härer
Composing High-Assurance Software
Natarajan Shankar
End-to-End Security for Evolved Computer Systems
Earlence Fernandes
A Conversation on the Draft Digital Personal Data Protection Bill 2022
Apar Gupta
Software needs Watchdogs
Tom Henzinger
A Systems Security Perspective on Building Secure and Reliable Deep Learning Systems
Sanghyun Hong
SCALES: MPC with Small Clients and Large Ephemeral Servers
Anasuya Acharya
Privacy Preserving Collaborations: DPFs to the rescue
Adithya Vadapalli
A Conversation on the Draft Indian Telecommunication Bill 2022
Debayan Gupta
Biometrics: When Technology Meets the Real-World
Arun Ross
Twitter Facebook-f Linkedin Youtube
  • trustlabcse.iitb.ac.in
  • +91-22-2159-6725
  • Department of Computer Science and Engineering
    Indian Institute of Technology Bombay
    Powai, Mumbai 400076
IITB logo