Presentations

  • Verifiable ASICs
    Security & Privacy (Oakland), May 2016 [pdf (2.2 MB)]
    A slightly longer version of this talk appeared at the DIMACS/MACS Workshop on Cryptography in the RAM Model of Computation, June 2016 [pdf (3.2 MB)]
  • (Implementations of) verifiable computation and succinct arguments: survey and wishlist
    (This talk surveys the last few years of progress on (implementations of) protocols for verifiable computation and closely related problems, such as succinct non-interactive (zero knowledge) arguments. Watching the talk is likely to be an efficient way to begin a literature search and to get pointers to research questions for the area.)
    Simons Institute: Securing Computation, June 2015 [pptx (1.1 MB), video]
  • Efficient RAM and control flow in verifiable outsourced computation
    NDSS, February 2015 [pdf (351 kB)]
  • Verifying computations with state
    SOSP, November 2013 [pdf (243 kB), key (773 kB)]
  • Verifying remote executions: from wild implausibility to near practicality
    Keynote at HotDep, November 2013 [pptx (5 MB)]
  • Making verifiable computation a systems problem
    Microsoft Research Faculty Summit, July 2013 [pptx (2.7 MB), video]
  • A hybrid architecture for interactive verifiable computation
    Security & Privacy (Oakland), May 2013 [pptx (906 kB)]
  • Resolving the conflict between generality and plausibility in verified computation
    EuroSys, April 2013 [pdf (182 kB), key (590 kB)]
  • Taking proof-based verified computation a few steps closer to practicality
    Security, August 2012 [pdf (corrected, 126 kB)]
  • Making argument systems for outsourced computation practical (sometimes)
    NDSS, February 2012 [pdf (12 MB), pptx (673 kB)]