The Confidential Computing Frontier: A New Paradigm for Compute and AI 

Abstract: Confidential Virtual Machines (CVMs) are the cornerstone of the modern push for Private AI and the future “default” for protecting data in use, however, the transition from architectural specification to secure deployment is fraught with challenges. While SEV-SNP and TDX offer a new paradigm for data-in-use protection, their security properties are not static. As

The DNS as National Critical Infrastructure in an Era of Geopolitical Tensions

Abstract: The current geopolitical situation is characterized by growing dependence on digital infrastructures and increasing international tensions. For Switzerland, the Domain Name System (DNS) represents a crucial component in ensuring digital sovereignty and the protection of national interests. As a neutral state, Switzerland is particularly committed to maintaining its digital infrastructure in an independent, resilient,

Towards a New Generation of Cryptographic Software

Abstract: Cryptographic software is currently facing two major challenges. First, upgrading our cryptographic infrastructure to post-quantum primitives is probably the largest and most demanding cryptographic migration effort ever. New software needs to be written, optimized for different platforms, extensively tested and audited, and eventually integrated into protocols and systems. Second, it becomes increasingly clear that

Did Security Notifications Reach the Owners of IoT Devices?

Abstract: We have been working to discover IoT devices with security risks and to deliver security notifications to their owners. Our activities include discovering remote management devices used in critical infrastructure and notifying their operators; investigating IoT devices deployed within university networks and issuing notifications to administrators; and offering a security diagnostic service for consumer

Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head

Abstract: We propose efficient, post-quantum threshold ring signatures constructed from one-wayness of AES encryption and the VOLE-in-the-Head zero-knowledge proof system. Our scheme scales efficiently to large rings and extends the ring signatures paradigm. We define and construct key-binding deterministic tags for signature linkability, that also enable succinct aggregation with approximate lower bound arguments of knowledge;