π’ We have extended the deadline for our EC workshop to *Monday AoE*!
Submit your talk proposal on any topic related to cryptographic proofs and proof techniques π€
Take the opportunity to advertise your ongoing, submitted or published work, or to share other insights related to security proofs
18.02.2026 12:03
π 9
π 4
π¬ 1
π 0
Finally got around to upload the slides from my Paris Crypto Day talk "Oblivious Pseudorandom Functions in
a Post-Quantum World"- check them out here: heimberger.xyz/docs/cryptod...
18.02.2026 09:45
π 4
π 0
π¬ 0
π 0
DCTF26
Schedule, talks and talk submissions for DCTF26
DCTF26 will happen from March 21, 2026 - March 22, 2026 in Ljubljana, which is most beautiful in Spring.
DCTF is my favourite conference of the year. It's technically challenging, student-organized and also free. Please consider submitting to the CFP: cfp.dragonsec.si/dctf26/cfp (speaker dinner!)
26.01.2026 09:24
π 0
π 0
π¬ 0
π 0
15:00β16:00: Duy Nguyen: "OMIX: Offline Mixing for Scalable Self-Tallying Elections"
16:00 - 16:15: Coffee
16:15β17:15: Ivan Visconti : βTowards Optimal Concurrent-Secure Blind Schnorr Signatures"
12.01.2026 08:49
π 0
π 0
π¬ 0
π 0
Schedule for the Paris Crypto Days on January 16th at Telecom Paris:
09:30β10:15: Breakfast
10:15β12:15: T. Debris & A. Chailloux βFrom Regevβs Reduction to Quantum Advantagesβ
12:15β14:00: Lunch
14:00β15:00: Lena Heimberger: βOblivious Pseudorandom Functions in a Post-Quantum Worldβ
12.01.2026 08:48
π 0
π 0
π¬ 1
π 0
Abstract. In this work, we initiate the study of aborting hash functions, i.e., hash functions that may abort on a non-negligible fraction of inputs. We introduce the aborting random oracle model (aROM), an idealized framework that extends the standard random oracle model (ROM) to account for aborts. Within this model, we derive bounds for various security notions and establish generic indifferentiability results demonstrating how to construct aborting random oracles from standard ones. Consequently, the derived bounds ultimately hold in the standard ROM. In this way, the aROM and its associated bounds provide a convenient and easy-to-use framework for analyzing cryptographic constructions that rely on potentially aborting hash functions.
To illustrate the utility of our framework, we apply our techniques to two settings: (1) the analysis of SNARK-friendly incomparable hypercube encodings, a core primitive in hash-based signature schemes, and (2) the analysis of grinding in FiatβShamir-based non-interactive arguments. Through our generic indifferentiability results, we can easily translate these analyses into concrete security bounds in the standard (non-aborting) random oracle model.
Image showing part 2 of abstract.
Aborting Random Oracles: How to Build them, How to Use them (Gottfried Herold, Dmitry Khovratovich, Mikhail Kudinov, Stefano Tessaro, Benedikt Wagner) ia.cr/2026/016
09.01.2026 02:47
π 2
π 2
π¬ 0
π 0
The EU says it is considering designating WhatsApp a "very large platform", after WhatsApp published user numbers above the DSA threshold in February 2025 (Louise Breusch Rasmussen/Reuters)
Main Link | Techmeme Permalink
09.01.2026 13:20
π 8
π 2
π¬ 0
π 1
Abstract. We study a new pairing, beyond the Weil and Tate pairing. The Weil pairing is a non-degenerate pairing E[m]β
Γβ
E[m]βββΞΌ_(m), which operates on the kernel of [m]. Similarly, when ΞΌ_(m)βββπ½_(q)^(*), the Tate pairing is a non-degenerate pairing E[m](π½_(q))β
Γβ
E(π½_(q))/[m]E(π½_(q))βββΞΌ_(m), which connects the kernel and the rational cokernel of [m]. We define a pairing
β¨βββ©_(m)β:βE(π½_(q))/[m]E(π½_(q))β
Γβ
E(π½_(q))/[m]E(π½_(q))βββΞΌ_(m)
on the rational cokernels of [m], filling the gap left by the Weil and Tate pairing. When E[m]βββE(π½_(q)), this pairing is non-degenerate, and can be computed using three Tate pairings, and two discrete logarithms in ΞΌ_(m), assuming a basis for E[m]. For mβ=ββ prime, this pairing allows us to study E(π½_(q))/[β]E(π½_(q)) directly and to simplify the computation for a basis of E[β^(k)], and more generally the Sylow β-torsion. This finds natural applications in isogeny-based cryptography when computing β^(k)-isogenies.
The Cokernel Pairing (Krijn Reijnders) ia.cr/2026/001
02.01.2026 16:34
π 4
π 3
π¬ 0
π 1
I'll be around Melbourne for LatticeCC before asiacrypt. Let me know if you want to talk lattices!
25.11.2025 22:54
π 0
π 0
π¬ 0
π 0
π£ Germany's close to reversing its opposition to mass surveillance & private message scanning, & backing the Chat Control bill. This could end private comms-& Signal-in the EU.
Time's short and they're counting on obscurity: please let German politicians know how horrifying their reversal would be.
06.10.2025 06:46
π 2265
π 1625
π¬ 31
π 46
Abstract. Embedded devices commonly rely on digital signatures to ensure both integrity and authentication. For example, digital signatures are typically verified during the boot process or firmware updates to verify the integrity of a system. They are also used to ensure authenticity of a communication party in secure protocols. Fault injection can be used to tamper with a device in order to cause malfunctioning during cryptographic computations. For example, fault injections can be used to disturb digital signing operations. With the right type of fault an attacker can compute private keys from faulted signatures. However, fault injections can also be used during verification to get maliciously crafted digital signatures accepted during signature verification with catastrophic consequences for the security of an embedded device. In this paper, we introduce new non-obvious fault injection attacks on the verification routines of Dilithium and Falcon signature schemes, which allow an attacker to get signatures for arbitrary messages accepted by fault injection. We demonstrate the feasibility of our attacks by simulations using an ARM Cortex-M4 and the pqm4 library as a target of evaluation and pinpoint vulnerable instructions. Finally, we propose and discuss possible countermeasures against these attacks.
Image showing part 2 of abstract.
Forging Dilithium and Falcon Signatures by Single Fault Injection (Sven Bauer, Fabrizio De Santis) ia.cr/2025/2029
03.11.2025 16:09
π 3
π 2
π¬ 0
π 0
Thank you!
01.11.2025 23:57
π 1
π 0
π¬ 0
π 0
Update: the claimed bugfix is refuted!
20.10.2025 03:35
π 3
π 1
π¬ 0
π 0
π°οΈ SATCOM Security
Research project homepage for SATCOM Security: papers, source code, and recent satellite communications vulnerabilities.
This is amazing research by Nadia Heninger and her co-authors Wenyi Morty Zhang, Annie Dai, Keegan Ryan, Dave Levin and Aaron Schulman. TL;DR a huge number of satellite links over our heads are totally unencrypted. satcom.sysnet.ucsd.edu
14.10.2025 01:16
π 147
π 69
π¬ 5
π 8
Abstract. Poseidon and Poseidon2 are cryptographic hash functions crafted for efficient zero-knowledge proof systems and have seen wide adoption in practical applications. We introduce the use of the Graeffe transform in univariate polynomial solving within this line of work. The proposed method streamlines the root recovery process in interpolation attacks and achieves several orders of magnitude acceleration in practical settings, enabling a new and more efficient class of attacks against Poseidon targeting round-reduced permutations and constrained input/output instances. We release open-source code and describe our method in detail, demonstrating substantial improvements over prior approaches: reductions in wall time by a factor of 2ΒΉΒ³ and in memory usage by a factor of 2^(4.5). Memory-access costs for NTTs turn out to be a dominant barrier in practice. And we prove that this cost increases at least as the 4/3-power of the input size (up to logarithmic factors), which suggests the commonly used pseudo-linear cost model may underestimate the true resource requirements. This behavior contrasts with multivariate equation solving, whose main bottleneck remains finite-field linear algebra. We argue that, when selecting parameters, designers should account for interpolation-based attacks explicitly, since their practical hardness is determined by different, and sometimes stronger, resource constraints than those of multivariate techniques.
Image showing part 2 of abstract.
Graeffe-Based Attacks on Poseidon and NTT Lower Bounds (Ziyu Zhao, Antonio Sanso, Giuseppe Vitto, Jintai Ding) ia.cr/2025/1916
17.10.2025 02:28
π 5
π 3
π¬ 0
π 0
Slides of my talk titled "Lattices give us KEMs and FHE, but where are the efficient lattice PETs? -- By Example of (Verifiable) Oblivious PRFs" given at spiqe-workshop.github.io are here: github.com/malb/talks/b...
Thanks @kennyog.bsky.social and @jurajsomorovsky.bsky.social for inviting me.
24.06.2025 09:56
π 12
π 4
π¬ 0
π 0
Registration for the Leuven Isogeny Days 6 is now open!
π
10β12 Sept 2025 @ KU Leuven
Morning: research talks
Afternoon: brainstorming sessions
More info: www.esat.kuleuven.be/cosic/projec...
#isogeny #isocrypt #erc #postquantum
16.06.2025 06:17
π 11
π 9
π¬ 0
π 1
We (finally) published all the material from this course on SQIsign, including lecture slides and exercise sheets for the Sage laboratory. Available here: github.com/andreavico/S...
10.06.2025 15:58
π 16
π 16
π¬ 1
π 0
π€π―οΈ #graz
10.06.2025 14:37
π 0
π 0
π¬ 0
π 0
BGP handling bug causes widespread internet routing instability
On May 20th 2025 a BGP message was propagated that triggered some surprisingly disruptive behaviours with two major BGP implementations make up a lot of the internet.
In a new blog post, I will dissect what that message was, and my thoughts on how it happened:
blog.benjojo.co.uk/post/bgp-att...
27.05.2025 11:03
π 32
π 8
π¬ 0
π 0
Abstract. At the current state of the art, algebraic attacks are the most efficient method for finding preimages and collisions for arithmetization-oriented hash functions, such as the closely related primitives Poseidon/Poseidon2 and Neptune. In this paper, we revisit GrΓΆbner basis (GB) attacks that exploit subspace trails to linearize some partial rounds, considering both sponge and compression modes.
Starting from Poseidonβs original security evaluation, we identified some inaccuracies in the model description that may lead to misestimated round requirements. Consequently, we reevaluate and improve the proposed attack strategy. We find that depending on the concrete instantiation, the original security analysis of Poseidon under- or overestimates the number of rounds needed for security. Moreover, we demonstrate that GB attacks leveraging subspace trails can outperform basic GB attacks for Poseidon/Poseidon2 and Neptune.
We propose a variant of the previous attack strategy that exploits a crucial difference between Poseidon/Poseidon2 and Neptune: while Poseidonβs inverse round functions have a high degree, Neptuneβs inverse external rounds maintain the same degree as the forward rounds. Using this new model, we demonstrate that Neptuneβs security in compression mode cannot be reduced to its security against the Constrained-Input-Constrained-Output (CICO) problem. To the best of our knowledge, this is the first time a concrete example has been provided where finding preimages is easier than solving the corresponding CICO problem.
Our results emphasize the importance of considering the mode of operation in security analysis while confirming the overall security of Poseidon/Poseidon2 and Neptune against the presented algebraic attacks.
Image showing part 2 of abstract.
Poseidon and Neptune: GrΓΆbner Basis Cryptanalysis Exploiting Subspace Trails (Lorenzo Grassi, Katharina Koschatko, Christian Rechberger) ia.cr/2025/954
26.05.2025 17:52
π 4
π 1
π¬ 0
π 0
Abstract. Poseidon and Poseidon2 are cryptographic hash functions designed for efficient zero-knowledge proof protocols and have been widely adopted in Ethereum applications. To encourage security research, the Ethereum Foundation announced a bounty program in November 2024 for breaking the Poseidon challenges, i.e.Β solving the CICO (Constrained Input, Constrained Output) problems for round-reduced Poseidon constructions. In this paper, we explain how to apply the Graeffe transform to univariate polynomial solving, enabling efficient interpolation attacks against Poseidon. We will provide an open-source code and details our approach for solving several challenges valued at $20000 in total. Compared to existing attacks, we improves 2^{13} and 2^{4.5} times in wall time and memory usage, respectively. For all challenges we solved, the cost of memory access turns out to be an essential barrier, which makes the security margin much larger than expected. We actually prove that the memory access cost for FFT grows as the 4/3-power of the input size, up to a logarithmic factor. This indicates the commonly used pseudo linear estimate may be overly conservative. This is very different from multivariate equation solving whose main bottleneck is linear algebra over finite fields. Thus, it might be preferable to choose parameters such that the best known attack is interpolation, as it presents more inherent hardness.
Image showing part 2 of abstract.
Breaking Poseidon Challenges with Graeffe Transforms and Complexity Analysis by FFT Lower Bounds (Ziyu Zhao, Jintai Ding) ia.cr/2025/950
26.05.2025 17:36
π 2
π 2
π¬ 1
π 0
lattirust
Lattice zero-knowledge/succinct arguments, and more - lattirust
I'm happy to finally open-source lattirust, a library for lattice-based zero-knowledge/succinct arguments! Lattirust is somewhat like arkworks, but for lattices; and like lattigo, but for arguments.
β github.com/lattirust
20.05.2025 14:55
π 32
π 16
π¬ 2
π 0
User Behaviour in Mobile Messengers
We're studying user messaging behaviour to get data for a simulation for key transparency. If you have 10 minutes, please fill out this survey: survey.tugraz.at/mobile-messe... (if you are around Graz and fill it out before Thursday, you may win a free drink at the local CTF team's fundraiser!)
20.05.2025 12:13
π 0
π 0
π¬ 0
π 0