[crypto] Fwd: CWG program 23 May

R. Hirschfeld ray at unipay.nl
Fri May 9 14:08:47 CEST 2025



-------- Original Message --------
Subject: CWG program 23 May
Date: 2025-05-09 13:07
 From: "Guarise Vieira, Heloise" <h.guarise.vieira at tue.nl>
To:

Dear all,

Find below the program for the next Crypto Working Group, on 23 May at 
de Kargadoor, in Utrecht.
The address to de Kargadoor is Oudegracht 36 (google 
maps<https://maps.app.goo.gl/UZUjwUNUbvJZhnv89>).

Best regards,


10:45
An Algebraic Approach for Evaluating Random Probing Security with 
Application to AES
Vahid Jahandideh

In this research, we address a key challenge in securing cryptographic 
implementations: protecting them against side-channel attacks, where 
unintended physical signals—such as power consumption or electromagnetic 
emissions—can be exploited to extract secret information, like 
cryptographic keys. While existing protections (notably masking) offer 
theoretical security guarantees, ensuring their robustness in realistic, 
noisy environments remains a complex task. Our contribution introduces a 
practical method to assess how resilient these protections are when 
leaks occur randomly and unpredictably. We propose a streamlined 
approach that not only provides meaningful security estimates but also 
enables an efficient design for protecting AES, a widely used encryption 
standard. This work aims to bridge the gap between theoretical models 
and practical security, with potential implications for any system where 
secure cryptographic processing is essential.

11:30 - lunch break

11:45
A Hybrid Post-Quantum Password Authenticated Key Exchange
Jelle Vos

NIST has been standardizing post-quantum KEMs and post-quantum 
signatures, which allow us to instantiate existing systems with 
post-quantum alternatives. However, organizations are typically not so 
eager to replace classical primitives directly with post-quantum ones 
because they have not gotten as much scrutiny and have not reached the 
same level of maturity. Instead, organizations want to deploy hybrid 
constructions, which are guaranteed to be as strong as the classical 
primitive, but they are also conjectured to withstand quantum attacks. 
Hybrid KEMs and hybrid signatures are easy to achieve by composing two 
KEMs or two signatures in parallel, but the same does not hold for all 
protocols and primitives. One such example is a password-authenticated 
key exchange (PAKE), which establishes a shared high-entropy key between 
two parties who know a shared low-entropy password (without relying on 
PKI). When composing two existing PAKEs in parallel, there are many 
cases in which the resulting PAKE is only as strong as the weakest link, 
allowing one to break security by breaking only one of the two PAKEs. We 
propose the first secure hybrid PAKE based on standardized primitives 
called CPaceOQUAKE as well as an extension to the asymmetric setting, in 
which one of the two parties only needs a verifier of the password.

12:30 - lunch break

14:00
Shifting our knowledge of MQ-Sign security
Monika Trimoska

Unbalanced Oil and Vinegar (UOV) is one of the oldest, simplest, and 
most studied ad-hoc multivariate signature schemes. UOV signature 
schemes are attractive because they have very small signatures and fast 
verification. On the downside, they have large public and secret keys. 
As a result, variations of the traditional UOV scheme are usually 
developed with the goal to reduce the key sizes. Seven variants of UOV 
were submitted to the additional call for digital signatures by NIST, 
prior to which, a variant named MQ-Sign was submitted to the (South) 
Korean post-quantum cryptography competition (KpqC). In this talk, we 
will look closely into MQ-Sign and show the full timeline of the 
evolution of this signature scheme, including several algebraic attacks 
and changes to the design.

14:45 - coffee break

15:00
Secure Floating Points
Thijs Veugen
Secure multi-party computation (MPC) and homomorphic encryption are very 
powerful tools to compute with secret numbers without revealing inputs 
or any intermediate values. To securely achieve high accuracy with 
varying number sizes, one needs to work with floating points in the 
secret (secret-shared or encrypted) domain. The main bottleneck of 
secure floating points is addition. We improve its efficiency by 
designing a protocol for multiple additions, using standard building 
blocks available in most MPC platforms. The more additions n were 
combined, the larger the relative gain, up to a factor 13 with n = 
1,024. Additionally, we introduce a new protocol for securely computing 
the bitlength (given upper bound M), the first one with linear time 
complexity and constant round complexity. It reduces secure 
multiplications with a factor 4 (for the constant-round solution), or 
the number of communication rounds with a factor M/2 (for the 
logarithmic-round solution). We evaluate accuracy, execution time and 
communication complexity of our protocols, and release them open source, 
such that they can be used to improve the efficiency of secure 
floating-point arithmetic.

15:45 - end of activities
--

[Image]

Heloise Vieira, PhD
Discrete Mathematics Cluster, Project Leader
Department of Mathematics and Computer Science
Phone number +31 (0)402474864

De Zaale, Eindhoven
05 MetaForum, MF 5.120


More information about the crypto mailing list