The affiliated events will take place at ENS Lyon on April 22nd and April 23rd. Every participant must register (including attendees, speakers, organizers, even if your fee is waived). Registration goes through the Eurocrypt 2023 registration.
On-site registration opens at 8.30am on Saturday and Sunday.
The SSR conference series brings together academia, industry, and people involved in standards bodies like IETF, ISO, and NIST to discuss the various aspects of security standardisation. SSR 2023 is the 8th iteration of the SSR conference series launched in 2014.
The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. At Eurocrypt, we intend to bring together cryptography researchers interested in security standardisation with practitioners from industry and standards bodies, and also to bring the latter closer to the broader cryptographic community.
Papers offering research contributions to the area of security standardisation are solicited for submission. SSR 2023 also invites Systematisation of Knowledge (SoK) papers and vision papers relating to security standardisation. Submission deadline is January 12, 2023; see the Call for Papers [https://ssresearch2023.github.io/cfp.html] for more details.
Algorithms from symmetric cryptography such as hash functions, and stream/block ciphers, have been at the heart of many higher level cryptographic protocols. However, in recent years, the specific design requirement of new advanced protocols has given raise to new needs that are improperly addressed by state-of-the-art algorithms: while safe, current algorithms like the AES or SHA-3 are too inefficient in these contexts.
From arithmetization-oriented hash functions enabling a cheap zero-knowledge verification of their evaluation, to homomorphic encryption-friendly stream ciphers, new symmetric algorithms need to be designed and analyzed.
The aim of this workshop is to bring together the users of such primitives, their designers, and their analysts.It will be organized as a sequence of invited talks and tutorials revolving around such questions as
Code-based cryptography is the area of research that focuses on the study of cryptosystems based on error-correcting codes, following the seminal work of McEliece and Niederreiter in the late 1970s - early 1980s. These systems have shown no vulnerabilities to quantum attackers and this research branch is widely regarded as one of the most promising in the so-called area of Post-Quantum Cryptography. Current efforts in code-based cryptography are directed at producing fast, secure and efficient schemes. Research in this area has also been fostered by the recent NIST's Post-Quantum Standardization call.
The goal of this two-day event is to promote this research area to an increasingly larger audience. Besides bringing together the existing community, in fact, CBCrypto aims at providing an opportunity to extend the range of participation to researchers approaching this area for the first time, or simply interested in knowing more about it. The program includes invited talks, contributed talks and dedicated discussion sessions.
The Brainstorm Session will consist of two parts: a series of "idea pitches" in the morning, to figure out potential research ideas in isogeny-based cryptography, and brainstorm sessions in the afternoon that focus on these research ideas.
In recent years, the interplay between artificial intelligence (AI) and security is becoming more prominent and important. This comes naturally because of the need to improve security more efficiently. One specific domain of security that steadily receives more AI applications is cryptography. We already see how AI techniques can improve implementation attacks, attacks on PUFs, hardware Trojan detection, etc. Besides AI's role in cryptography, we believe cryptography for AI to be an emerging and important topic. As we can see an increasing number of attacks on AI systems, one possible research direction could be to investigate which cryptographic techniques can be used to mitigate such threats. We aim to gather researchers from academia and industry that work on various aspects of cryptography and AI to share their experience and discuss how to strengthen the collaboration. We are especially interested in exploring the transferability of techniques among various cryptographic applications and AI protection mechanisms. Finally, we will discuss the developments happening in the last years, i.e., from the previous AICrypt events.
The SSR conference series brings together academia, industry, and people involved in standards bodies like IETF, ISO, and NIST to discuss the various aspects of security standardisation. SSR 2023 is the 8th iteration of the SSR conference series launched in 2014.
The purpose of this conference is to discuss the many research problems deriving from studies of existing standards, the development of revisions to existing standards, and the exploration of completely new areas of standardisation. At Eurocrypt, we intend to bring together cryptography researchers interested in security standardisation with practitioners from industry and standards bodies, and also to bring the latter closer to the broader cryptographic community.
Papers offering research contributions to the area of security standardisation are solicited for submission. SSR 2023 also invites Systematisation of Knowledge (SoK) papers and vision papers relating to security standardisation. Submission deadline is January 12, 2023; see the Call for Papers [https://ssresearch2023.github.io/cfp.html] for more details.
Algorithms from symmetric cryptography such as hash functions, and stream/block ciphers, have been at the heart of many higher level cryptographic protocols. However, in recent years, the specific design requirement of new advanced protocols has given raise to new needs that are improperly addressed by state-of-the-art algorithms: while safe, current algorithms like the AES or SHA-3 are too inefficient in these contexts.
From arithmetization-oriented hash functions enabling a cheap zero-knowledge verification of their evaluation, to homomorphic encryption-friendly stream ciphers, new symmetric algorithms need to be designed and analyzed.
The aim of this workshop is to bring together the users of such primitives, their designers, and their analysts.It will be organized as a sequence of invited talks and tutorials revolving around such questions as
Code-based cryptography is the area of research that focuses on the study of cryptosystems based on error-correcting codes, following the seminal work of McEliece and Niederreiter in the late 1970s - early 1980s. These systems have shown no vulnerabilities to quantum attackers and this research branch is widely regarded as one of the most promising in the so-called area of Post-Quantum Cryptography. Current efforts in code-based cryptography are directed at producing fast, secure and efficient schemes. Research in this area has also been fostered by the recent NIST's Post-Quantum Standardization call.
The goal of this two-day event is to promote this research area to an increasingly larger audience. Besides bringing together the existing community, in fact, CBCrypto aims at providing an opportunity to extend the range of participation to researchers approaching this area for the first time, or simply interested in knowing more about it. The program includes invited talks, contributed talks and dedicated discussion sessions.
CrossFyre aims to bring together women* in cyber security to promote their research topics, help them to develop their careers and create a space to discuss gender-related topics in cyber security.
*all people who identify as womenIn the last decade it has become clear that permutation-based cryptography is highly competitive in terms of performance and resource usage when compared to classical block ciphers and their modes.
The goal of PBC workshop is to bring together academics and industry experts to discuss recent advances in this research area, as well as provide an introduction to anyone interested in discovering more about this field.
The workshop will address diverse aspects of permutation-based cryptography, like cryptanalysis, modes, protocols, and implementations in a sequence of invited and contributed talks.
A Homomorphic Encryption (HE) is a cryptographic scheme for computing over encrypted data. So it is known to be perfect protection for data in use as well as data at rest and data in transit because data can be analyzed without decryption. HE is selected among 5 Impactful Technologies from the Gartner Emerging Technologies and Trends Impact Radar for 2022, saying “HE will be a core technology for many future SaaS offerings to ensure the protection and privacy of data between third-party data processing and analytics providers.” It is well known that HE has some performance issues, but HE technologies have evolved rapidly. HE is practical now.
This tutorial consists of two parts. The first one is for the homomorphic encryption scheme. We will explain the key features and design choices of HE and demonstrate how fast HE is. In the hands-on session, you can experience SOTA implementation of HE using HEaaN Library, which is publicly available at https://heaan.it. Secondly, we introduce how HE can be used for data analysis. HE can be applied to various analyses, including statistics, machine learning, and deep learning. In the hands-on session, you will have a chance to use a HE-based data analysis tool, such as HEaaN.stat, a HE-based statistical analysis software using HEaaN library, which will be publicly available at https://heaan.it.
After taking this tutorial, attendees will be familiar with HE and get to know how to apply HEaaN in their work to get better results than ever before.
The affiliated events will be held at ENS Lyon, science campus, which it located in the South of the city. It is easily accessed from subway line B (Debourg or Gerland station), or from tramway lines T1 (ENS Lyon station) and T6 (Debourg station).
There is another ENS Lyon campus, directly next to the Debourg metro station: this is not the science campus!
The lunch breaks will take place at Ninkasi Gerland, which is located within 5-min walking distance from the events.
Affiliated events will be held at ground level of ENS Lyon. They will be located as follows: