Cryptography and Information Security (CIS) Seminars

Efficiently Batching Unambiguous Interactive Proofs
Friday, November 7, 2025 - 10:30am to 12:00pm

We show that if a language $\mathcal{L}$ admits a public-coin unambiguous interactive proof (UIP) with round complexity $\ell$, where $a$ bits are communicated per round, then the \emph{batch language} $\mathcal{L}^{\otimes k}$, i.e.

Gödel in Cryptography: Zero-Knowledge for NP With No Interaction, No Setup, and Perfect Soundness
Friday, October 24, 2025 - 10:30am to 12:00pm
Gödel showed that there are true but unprovable statements. This was bad news for Hilbert, who hoped that every true statement was provable.
Parallel Repetition for Post-Quantum Arguments
Friday, October 17, 2025 - 10:30am to 12:00pm

We show that parallel repetition of public-coin interactive arguments reduces the soundness error at an exponential rate even in the post-quantum setting.

The Sponge is Quantum Indifferentiable
Friday, October 10, 2025 - 10:30am to 12:00pm
The sponge is a cryptographic construction that turns a public permutation into a hash function. When instantiated with the Keccak permutation, the sponge forms the NIST SHA-3 standard.
Succinct Non-interactive Arguments of Proximity
Friday, September 26, 2025 - 10:30am to 12:00pm

We study succinct non-interactive arguments of proximity (SNAP), which allow a prover to convince a verifier that a statement is true through a short message.

How to Verify Any (Reasonable) Distribution Property: Computationally Sound Argument Systems for Distributions
Friday, September 19, 2025 - 10:30am to 12:00pm

As statistical analyses become increasingly central, there is a growing need to ensure their results are correct. Approximate correctness can be verified by replicating the entire analysis, but can we verify without replication?

Succinct Witness Encryption for Batch Languages and Applications
Friday, September 12, 2025 - 10:30am to 12:00pm
Side Channel Attacks: Lessons Learned or Troubles Ahead?
Monday, December 9, 2024 - 4:00pm to 6:00pm

The security and architecture communities will remember the past five years as the era of side channels. Starting from Spectre and Meltdown, time and again we have seen how basic performance-improving features can be exploited to violate fundamental security guarantees.

Perpetual Encryption
Friday, August 16, 2024 - 10:30am to 12:00pm

We consider the problem of building a private blockchain (BC) on top of a public one. This has the advantage that users of the private BC do not need to build expensive consensus protocol, while still maintaining privacy.

Post-quantum secure signature schemes from isogenies
Friday, July 19, 2024 - 10:30am to 12:00pm

Most public-key cryptography that is deployed in today’s systems is susceptible to attacks by quantum computers.

Pages

Subscribe to Cryptography and Information Security (CIS) Seminars