Welcome to our lab’s informal talk series, organized by professor Jeremiah Blocki!
We meet every week in one of the LWSN computer science building conference rooms (or sometimes via Zoom).
The Blocki’s Lab Lunch at Purdue University explores the theoretical foundations of cryptography, privacy, usable security and complexity theory, focusing on how to design algorithms and protocols that achieve strong security guarantees with practical efficiency. Our research spans topics such as memory-hard functions, differential privacy, (amortized) locally decodable codes, and secure password systems, combining tools from theoretical computer science, information theory, and applied cryptography. Recent publications from the lab have introduced advances in provably memory-hard proofs of work, differentially private compression, conditional encryption, quantum reversibility and graph pebbling. Through our weekly Lab Lunch Talks, we share new results, discuss ongoing projects, and foster collaboration among students and researchers interested in the mathematics of security and the limits of efficient computation.
đź“… Upcoming and Past Talks
Fall 2025
Date
Speaker
Title
Materials
Dec 12, 2025
Blake
–
–
Dec 05, 2025
No Lab Lunch (TCC conference)
–
–
Nov 28, 2025
No Lab Lunch (Thanksgiving)
–
–
Nov 21, 2025
Seunghoon Lee
Differentially Private Compression and the Sensitivity of LZ77 (TCC practice talk-Zoom)
✨ Our lab’s ongoing projects combine deep theoretical insights with practical cryptographic design.
Here are a few themes we’re currently exploring:
quantum reversibility and graph pebbling— lower bound of on the quantum reversible cumulative pebbling cost. —> accepted in Eurocrypt25Full Version
Memory-Hard Functions & Proofs of Work — designing puzzles that are provably costly to compute yet efficient to verify. —> accepted in TCC25Full Version
Differential Privacy & Compression — developing algorithms that preserve data utility while protecting individual privacy. —> accepted in TCC25Full Version
(Amortized) Locally Decodable Codes — creating error-correcting schemes that balance robustness and efficiency in modern data systems. —> accepted in ISIT25Full Version, and ITCS25Link
Conditional Encryption — public key cryptographic scheme which conditionally encrypts a payload message given ciphertext of an unknown message and a control message nunder a binary predicate. —> accepted in CCS24Full Version.
💬 We welcome collaborations, reading group suggestions, and spontaneous “chalk-talk” ideas over lunch! contact: mameriek[at]purdue.edu
This site hosts the Blocki Lab’s seminar schedule, research highlights, and discussion summaries.