Eurocrypt 2024

May 26-30, 2024

Zurich, Switzerland

Affiliated Events

The affiliated events will take place at ETH Zurich on May 25-26, 2024. Every participant must register (including attendees, speakers, organizers, even if your fee is waived) through the Eurocrypt 2024 registration.

Saturday, May 25

Organizers: Krijn Reijnders (Radboud University Nijmegen), Jonathan Komada Eriksen (Norwegian University of Science and Technology)
Abstract:

The second edition of The Isogeny Club - Brainstorm Days will be an event where we together analyze several potential research ideas in isogeny-based cryptography. Participants can propose such ideas in the morning of the first day, and based on those ideas, several working groups hold brainstorming sessions on these ideas in the afternoon and morning of the following day. Finally, we wrap up with a quick presentation per group on the achieved results.

Organizers: Violetta Weger (Technical University of Munich), Anna-Lena Horlemann (University of St. Gallen), Jean-Christophe Deneuville (Ecole Nationale de l’Aviation Civile)
Abstract:

Code-based cryptography focuses on the study of cryptosystems that are based on hard problems from algebraic coding theory, following the seminal work of McEliece in the late 1970s. Due to the reopened standardization call by the NIST, the research in this direction has become one of the most pressing challenges.

The workshop aims at informing researchers across the community about the newest results in the field and fostering further collaborations. Besides bringing together the existing community, we provide an opportunity to extend the range of participation to researchers approaching this research area for the first time.

Organizers: Jonathan Bootle (IBM Research, Zürich), Elizabeth Crites (University of Edinburgh), Katerina Sotiraki (Yale University), Arantxa Zapico (Ethereum Foundation)
Abstract:

CrossFyre aims to bring together all people who identify as women and gender minorities in cyber security to promote their research topics, help them to develop their careers and create a space to discuss gender-related topics in cyber security.

The goal of the event is to create a network of early career research fellows, including post-docs, PhD students, as well as MSc and BSc students, and to provide mentoring opportunities with established researchers in the field of cyber security.

Organizers: Mariya Georgieva Belorgey (Inpher), Sergiu Carpov (Inpher)
Abstract:

Secure multiparty computation (MPC), fully homomorphic encryption (FHE), federated learning (FL), trusted execution environments (TEEs) and differential privacy (DP) are prominent examples of emerging PETs. They enable the computation of a function without revealing the input data. By incorporating these techniques, organizations strike a balance between preserving the privacy of sensitive input data and deriving valuable insights from data analysis, optimizing the privacy-utility tradeoff.

This tutorial will walk you through these technologies and show how to combine them in order to implement a hybrid PETs use-case. In the practical session you will learn how to implement a complete and hybrid privacy-preserving machine learning workflow using different PETs tools and libraries for PSI, MPC, FHE amongst others.

Sunday, May 26

Organizers: Krijn Reijnders (Radboud University Nijmegen), Jonathan Komada Eriksen (Norwegian University of Science and Technology)
Abstract:

The second edition of The Isogeny Club - Brainstorm Days will be an event where we together analyze several potential research ideas in isogeny-based cryptography. Participants can propose such ideas in the morning of the first day, and based on those ideas, several working groups hold brainstorming sessions on these ideas in the afternoon and morning of the following day. Finally, we wrap up with a quick presentation per group on the achieved results.

Organizers: Violetta Weger (Technical University of Munich), Anna-Lena Horlemann (University of St. Gallen), Jean-Christophe Deneuville (Ecole Nationale de l’Aviation Civile)
Abstract:

Code-based cryptography focuses on the study of cryptosystems that are based on hard problems from algebraic coding theory, following the seminal work of McEliece in the late 1970s. Due to the reopened standardization call by the NIST, the research in this direction has become one of the most pressing challenges.

The workshop aims at informing researchers across the community about the newest results in the field and fostering further collaborations. Besides bringing together the existing community, we provide an opportunity to extend the range of participation to researchers approaching this research area for the first time.

Organizers: Julian Loss (CISPA Helmholtz Center for Information Security), Lucjan Hanzlik (CISPA Helmholtz Center for Information Security)
Abstract:

Privacy-preserving technologies are experiencing a renaissance with increased interest from researchers and practitioners.

This workshop aims to provide an introduction to cryptographers and practitioners interested in learning more about fundamental topics surrounding privacy. As such, it will cover the basics of important primitives such as blind signatures, oblivious PRFs, anonymous credentials, privacy-preserving tokens, and more. It will also serve as an overview of recent advances and publications for experts in the area.

The one-day workshop will include invited talks by experts, providing an overview of the state-of-the-art and recent advances in the area of privacy-preserving cryptography. The topic-specific talks will be preceded by an overview talk given by a distinguished speaker.

Organizers: Stjepan Picek (Radboud University), Lejla Batina (Radboud University), Luca Mariot (University of Twente)
Abstract:

Recently, the synergy between artificial intelligence (AI) and security has gained increasing prominence and significance. This evolution naturally arises from the need to enhance security with greater efficiency. Among the many areas of security benefiting from AI's integration, cryptography stands as a notable field. We are already witnessing the application of AI techniques to address several problems in cryptography, such as enhancing defenses against implementation attacks and hardware Trojans, and investigating attacks on Physical Unclonable Functions (PUFs). Beyond AI's contributions to cryptography, it is also possible to identify the use of cryptography to solve security and privacy issues in AI systems as an emerging and pivotal subject. The mounting frequency of AI system attacks urges us to explore potential research avenues involving cryptographic strategies to counteract these threats. Our objective is to convene experts from both academic and industrial backgrounds, each contributing to diverse facets of cryptography and AI, to facilitate knowledge exchange and foster collaborative efforts. Of particular interest is the exploration of the transferability of techniques across different cryptographic applications and the strengthening of AI security mechanisms. Furthermore, we will delve into recent developments, including those stemming from previous AICrypt events, to provide insights into the evolving landscape of this field.

Organizers: Matilda Backendal (ETH Zurich), Miro Haller (University of California, San Diego)
Abstract:

The Cryptographic Applications Workshop (CAW) focuses on the construction and analysis of cryptography built for practice. The program contains a mixture of invited and contributed talks on recent developments in the field of applied cryptography.

The main themes of CAW are

  1. formalizing security of deployed cryptography,
  2. constructing cryptographic primitives and systems for practice, and
  3. the industry perspective on cryptography.

Organizers: Tommaso Gagliardoni (Kudelski Security), Marco Macchetti (Kudelski Security), Sylvain Pelissier (Kudelski Security)
Abstract:

The rapidly evolving landscape of cryptography introduces growing complexities which make secure code implementation very challenging. This is especially problematic in the fast-moving Web3 world, where bleeding-edge cryptographic schemes are deployed to protect large amount of funds, but also in privacy-sensitive applications and secure communications. In this context, not only does understanding cryptographic theory matter, but so does the effective implementation and auditing of cryptographic code.

This one-day workshop, uniquely situated at the intersection of theoretical and applied cryptography, aims to provide an immersive learning experience in cryptographic code auditing informed by real-world examples. It targets professionals and researchers looking to deepen their understanding and sharpen their skills in secure cryptographic code auditing.

The day will start with a series of lectures by seasoned experts on various critical topics, including hash functions, block ciphers, randomness, zero-knowledge protocols, and multi-party computation schemes. The lectures will be enriched with case studies from past cryptographic audits conducted by our company for high-profile clients. In the afternoon, attendees will put their learning to the test in an engaging Capture The Flag (CTF) challenge. Participants will split into teams and strive to identify vulnerabilities in flawed code snippets provided by the organizers, submitting their findings via an online portal. The event will conclude with a solutions discussion, and winning teams will be announced and awarded at the conference's rump session.

Still Have Questions?

eurocrypt2024workshops@iacr.org