The affiliated events will take place at the main Eurocrypt 2022 venue.
First envisioned in the late seventies, the first realization for fully homomorphic encryption only came three decades later. Fully homomorphic encryption has since been an active research topic. The FHE.org conference aims at being the premier forum gathering researchers, technologists and practitioners working on the design, development, deployment, validation, and applications of fully homomorphic encryption.
The program committee is seeking original contributions on all aspects of fully homomorphic encryption. Submissions across a broad range of the development phases are encouraged, from exploratory research and proof-of-concept studies to practical applications and deployment of fully homomorphic encryption and related technologies. Topics of interest include, but are not limited to:
More information on the website of the event.
Verifpal is new software for verifying the security of cryptographic protocols that aims is to work better for real-world practitioners, students and engineers without sacrificing comprehensive formal verification features. Verifpal has already been used to verify security properties for Signal, Scuttlebutt, TLS 1.3 and other protocols. It is a community-focused project, and available under a GPLv3 license.
At the Verifpal Tutorial, you will learn how to use Verifpal to model and verify the security goals of advanced, cutting-edge protocols such as Signal and TLS 1.3. No prior knowledge in formal verification is necessary Verifpal is specifically tailored for beginners and newcomers!
More information on the website of the event.
Code-based cryptography is the area of research that focuses on the study of cryp- tosystems based on error-correcting codes, following the seminal work of McEliece and Niederreiter in the late 1970s - early 1980s. These systems have shown no vul- nerabilities to quantum attackers and the relevant research branch is widely regarded as one of the most promising in the so-called area of Post-Quantum Cryptography. Current efforts in code-based cryptography are directed at producing fast, secure and efficient schemes. Research in this area has also been fostered by the recent NIST’s Post-Quantum Standardization call.
The goal of this two-day workshop is to bring together the community to discuss recent developments, as well as introduce the field to anyone interested in discovering more about this research area.
More information on the website of the event.
Abstract:
In recent years, the interplay between artificial intelligence (AI) and security is becoming more prominent and important. This comes naturally because of the need to improve security more efficiently. One specific domain of security that steadily receives more AI applications is cryptography. We already see how AI techniques can improve implementation attacks, attacks on PUFs, hardware Trojan detection, etc.
Besides AI's role in cryptography, we believe cryptography for AI to be an emerging and important topic. As we can see an increasing number of attacks on AI systems, one possible research direction could be to investigate which cryptographic techniques can be used to mitigate such threats.
We aim to gather researchers from academia and industry that work on various aspects of cryptography and AI to share their experience and discuss how to strengthen the collaboration. We are especially interested in exploring the transferability of techniques among various cryptographic applications and AI protection mechanisms. Finally, we will discuss the developments happening in the last year, i.e., from the previous AICRYPT event.
More information on the website of the event.
Decentralized Blockchain Applications rely on a variety of different cryptographic primitives and protocols that directly affect both security and efficiency. Improving these tools is not only of academic interest, but also impacts the security of millions of users. These applications relies on advanced frontier crypto schemes in order to tackle the harsh requirements of scalability and performance that haunt the most popular decentralised systems.
This workshop brings the most interesting and challenging open cryptographic questions that Ethereum, Filecoin and other blockchain systems face, to the attention of academia. We will cover a large spectrum of research topics, such as vector commitments, SNARKs, shuffles, authenticated data structures and more. We will start the day with an update on to the problems discussed at last year's workshop.
More information on the website of the event.