Eurocrypt 2022

May 30 to June 3, 2022

Trondheim, Norway

Affiliated Events

The affiliated events will take place at the main Eurocrypt 2022 venue.

Sunday 29th May

Abstract:

Verifpal is new software for verifying the security of cryptographic protocols that aims is to work better for real-world practitioners, students and engineers without sacrificing comprehensive formal verification features. Verifpal has already been used to verify security properties for Signal, Scuttlebutt, TLS 1.3 and other protocols. It is a community-focused project, and available under a GPLv3 license.

At the Verifpal Tutorial, you will learn how to use Verifpal to model and verify the security goals of advanced, cutting-edge protocols such as Signal and TLS 1.3. No prior knowledge in formal verification is necessary Verifpal is specifically tailored for beginners and newcomers!

More information on the website of the event.

Abstract:
Nearly all of current public-key cryptosystems are based on number theory problems, such as factoring of large integers or computing of discrete logarithms. These sys- tems constitute an excellent choice in many applications, and their security is well defined and understood. All of the above, however, will be vulnerable once quantum computers of an appropriate size will be available. There is then a strong need for alternative systems that would resist attackers equipped with quantum technology.

Code-based cryptography is the area of research that focuses on the study of cryp- tosystems based on error-correcting codes, following the seminal work of McEliece and Niederreiter in the late 1970s - early 1980s. These systems have shown no vul- nerabilities to quantum attackers and the relevant research branch is widely regarded as one of the most promising in the so-called area of Post-Quantum Cryptography. Current efforts in code-based cryptography are directed at producing fast, secure and efficient schemes. Research in this area has also been fostered by the recent NIST’s Post-Quantum Standardization call.

The goal of this two-day workshop is to bring together the community to discuss recent developments, as well as introduce the field to anyone interested in discovering more about this research area.

More information on the website of the event.

Monday 30th May

Abstract:
In recent years, the interplay between artificial intelligence (AI) and security is becoming more prominent and important. This comes naturally because of the need to improve security more efficiently. One specific domain of security that steadily receives more AI applications is cryptography. We already see how AI techniques can improve implementation attacks, attacks on PUFs, hardware Trojan detection, etc.

Besides AI's role in cryptography, we believe cryptography for AI to be an emerging and important topic. As we can see an increasing number of attacks on AI systems, one possible research direction could be to investigate which cryptographic techniques can be used to mitigate such threats.

We aim to gather researchers from academia and industry that work on various aspects of cryptography and AI to share their experience and discuss how to strengthen the collaboration. We are especially interested in exploring the transferability of techniques among various cryptographic applications and AI protection mechanisms. Finally, we will discuss the developments happening in the last year, i.e., from the previous AICRYPT event.

More information on the website of the event.

Abstract:

Decentralized Blockchain Applications rely on a variety of different cryptographic primitives and protocols that directly affect both security and efficiency. Improving these tools is not only of academic interest, but also impacts the security of millions of users. These applications relies on advanced frontier crypto schemes in order to tackle the harsh requirements of scalability and performance that haunt the most popular decentralised systems.

This workshop brings the most interesting and challenging open cryptographic questions that Ethereum, Filecoin and other blockchain systems face, to the attention of academia. We will cover a large spectrum of research topics, such as vector commitments, SNARKs, shuffles, authenticated data structures and more. We will start the day with an update on to the problems discussed at last year's workshop.

More information on the website of the event.

Abstract:
Nearly all of current public-key cryptosystems are based on number theory problems, such as factoring of large integers or computing of discrete logarithms. These sys- tems constitute an excellent choice in many applications, and their security is well defined and understood. All of the above, however, will be vulnerable once quantum computers of an appropriate size will be available. There is then a strong need for alternative systems that would resist attackers equipped with quantum technology.

Code-based cryptography is the area of research that focuses on the study of cryp- tosystems based on error-correcting codes, following the seminal work of McEliece and Niederreiter in the late 1970s - early 1980s. These systems have shown no vul- nerabilities to quantum attackers and the relevant research branch is widely regarded as one of the most promising in the so-called area of Post-Quantum Cryptography. Current efforts in code-based cryptography are directed at producing fast, secure and efficient schemes. Research in this area has also been fostered by the recent NIST’s Post-Quantum Standardization call.

The goal of this two-day workshop is to bring together the community to discuss recent developments, as well as introduce the field to anyone interested in discovering more about this research area.