Proceedings of the Second Workshop on Cryptography and Security in Computing Systems