The affiliated events will take place at University of Zagreb, Faculty of Electrical Engineering and Computing. The address is Unska 3, 10000 Zagreb.
In recent years, the interplay between artificial intelligence (AI) and security is becoming more prominent and important. This comes naturally because of the need to improve security in a more automated way. One specific domain of security that steadily receives more AI applications is cryptography. There, we already see how AI techniques can improve implementation attacks, attacks on PUFs, hardware Trojan detection, etc. Besides the role that AI already has in cryptography, we believe cryptography for AI to be an emerging and important topic. As we can see an increasing number of attacks on AI systems, one possible research direction could be to investigate which cryptographic techniques can be used to mitigate such threats. We aim to gather researchers from academia and industry that work on various aspects of cryptography and AI to share their experience and discuss how to strengthen the collaboration. We are especially interested to explore the transferability of techniques among various cryptographic applications and AI protection mechanisms.
More information on the website of the event.
Lightweight (LW) cryptography plays an essential role in secure communication of a specific class of devices with very specific and stringent constraints, and it is crucial in a number of emerging areas, such as sensor networks, healthcare, distributed control systems, the Internet of Things, cyber physical systems, etc. In 2018 the national institute of standards and technology of America (NIST) has initiated a process to solicit, evaluate, and standardize lightweight cryptographic algorithms that are suitable for use in constrained environments where the performance of current NIST cryptographic standards are not acceptable. This standardization process is in its second round of candidates evaluation.
The SILC event focuses on results of LW candidates in the NIST lightweight standardization process in the following domains:
More information on the website of the event.
Recently, the development of fault-tolerant quantum computers has accelerated, driven by heavy public and private investment. Due to this development, preparing the theory of cryptography for the arrival of quantum computers has become an important frontier of theoretical computer science. Mathematical tools for provable security in post-quantum and quantum cryptography have become a valuable resource. In addition, the exchange of ideas between the fields of cryptography and quantum information science is not as vivid as would be desirable due to the two fields traditionally being virtually without intersection.
This workshop strives to bring researchers from cryptography and quantum information science together to facilitate such an exchange of ideas, in particular with respect to quantum proof techniques that might be or already proved to be useful in cryptography. Topics will range from basic notions like quantum distinguishability measures and purification, to cutting-edge proof techniques overcoming the so-called “recording barrier” like superposition oracles and quantum rewinding.
More information on the website of the event.
Ethereum is one of the largest blockchains in the world and it relies on a variety of different cryptographic primitives and protocols that directly affect both its security and efficiency. Improving these tools is not only of academic interest, but also impacts the security of millions of users. Ethereum relies on advanced frontier crypto schemes in order to tackle the harsh requirements to scalability and performance that haunt the most popular decentralised systems.
This workshop brings the most interesting and challenging open cryptographic questions that Ethereum faces to the attention of academia. We will cover a large spectrum of research topics, such as multisignatures, commitments, verifiable delay functions, secure computation, zk-friendly hash functions and more. The event is free for all Eurocrypt attendants -- we just hope that you solve these open problems.
More information on the website of the event.
Almost all computing systems, from high-performance servers to tiny sensor nodes, are controlled by a Central Processing Unit (CPU). In the past years, it became clear that the security of CPUs needs to be taken into account during the entire design process, from the design of the low-level hardware components to the high-level CPU architecture. Researchers are taking on the challenging task of analyzing security vulnerabilities and proposing subsequent solutions, keeping in mind the importance of high performance and low power consumption.
Furthermore, machine learning applications will have an important influence on future CPU architectures and accelerators, and must be taken into account when performing security evaluations and developing protection mechanisms.
This workshop will cover the most recent findings in CPU vulnerabilities and mitigation techniques. The talks in the session are given by renowned speakers from industry and academia. A panel discussion will trigger the audience to follow new research directions in the design of secure and intelligent CPUs.
More information on the website of the event.