Computational records for RSA and finite field Diffie-Hellman

Abstract: This talk reports on the latest computational records in integer factoring and finite field discrete logarithms. These hard computational problems underpin the security of the public-key cryptographic primitives known as RSA and finite field Diffie-Hellman, which are still the most used public-key cryptographic primitives in many contexts. This work required a quite formidable amount of computing power, from various

Probabilistic Data Structures in Adversarial Environments

Abstract: Probabilistic data structures use space-efficient representations of data in order to (approximately) respond to queries about the data. Traditionally, these structures are accompanied by probabilistic bounds on query-response errors. These bounds implicitly assume benign attack models, in which the data and the queries are chosen non-adaptively, and independent of the randomness used to construct

Mondrian: Comprehensive Inter-domain Network Zoning Architecture

Abstract: A central element of designing IT security infrastructures is the logical segmentation of information assets into network zones sharing the same security requirements and policies. As more business ecosystems are migrated to the cloud, additional demands for cybersecurity emerge and make the network-zone operation and management for large corporate networks challenging. In this talk,

Smartcard security research at CRoCS – From testing to vulnerabilities and attacks

Abstract: This talk presents our research into the security of programmable smartcards, which are widely used devices that implement a wide range of cryptosystems, yet are mostly black-box with hardly any public information about their workings. By the end of the talk, you will learn – How we find vulnerabilities in smartcards using our open-source tools, even though

Online Seminar – ProtectIOn: Root-of-Trust for IO in Compromised Platforms

Abstract: Security and safety-critical remote applications such as e-voting, online banking, industrial control systems and medical devices rely upon user interaction that is typically performed through web applications. Trusted path to such remote systems is critical in the presence of an attacker that controls the user’s computer. Such an attacker can observe and modify any

Snappy: Fast On-chain Payments with Practical Collaterals

Abstract: Permissionless blockchains offer many advantagesbut also have significant limitations including high latency. Thisprevents their use in important scenarios such as retail payments,where merchants should approve payments fast. Prior works haveattempted to mitigate this problem by moving transactions off thechain. However, such Layer-2 solutions have their own problems:payment channels require a separate deposit towards eachmerchant