Aarhus University Seal

Crypto Seminar Talk

We have a seminar series where members and visitors of the section give talks about recent research in cryptology and information security. Everyone is welcome to attend the seminars!

For details about coming seminar talks, please see announcements under “Events" here: https://cs.au.dk/research/crypto-and-cybersecurity   

A list of previous talks is below. Talks prior to Autumn 2020 can be found here 

If you want to give a talk, please send an email to our seminar organizer Peter Scholl.

If you would like to start receiving announcements of the seminars, please contact Malene B.B. Andersen.

2025

WeekDateSpeakerTitle
5011/12Lucas OttowTools for polynomial computations in MPC
4827/11Diego Aranha and Anasuya Acharya

Diego: LINE-Break: Cryptanalysis And Reverse Engineering Of Letter Sealing

Anasuya: On Achieving "Best-in-the-Multiverse" MPCs 

4720/11Megan ChenCompositional frameworks for SNARKs in the random oracle model
4613/11Nitin Singh

Recent Advances in Linear Time Prover SNARKs

Remote talk

456/11Pierre MeyerMaintaining Sublinear Locality Over Time: Adaptively Secure MPC on a Reusable Hidden Graph
419/10Jacob ImolaPrivate Quantile Estimation in the Two-Server Model
3925/9 Jonathan Passerat-PalmbachPrivacy x MEV: mitigating, empowering, distributing 
3818/9Yizhou YaoPseudorandom Correlation Generators from Trace
364/9Juan LlobetWeaker Assumptions for Asymmetric Trust
3419/8Dheeraj Suryakari

Packed Pre-Constructed Publicly Verifiable Secret Sharing and Applications

At 14:00 in Nygaard-295

3314/8Xiaxi YeOn the Possibility and Impossibility of Information-Theoretic MPC Protocols with Constant Communication Complexity
2811/7Sunoo Park

The Case of Encrochat: A Real-World Law Enforcement Hack

At 11:00 AM in Nygaard-295

2626/6Ziyi GuanOn the Security of Succinct Arguments from Probabilistic Proofs
2519/6Archisman DuttaATAVISM - Private Originator Tracing in E2EE Messaging
2412/6Luiza SoezimaTowards Fuzzy Private Set Union
233/6Riccardo Lolato

Leap — A Fast, Lattice-based OPRF With Application to Private Set Intersection

Time: 10:30 AM // Place: Nygaard-395

2120/5Jonas Janneck

A Closer Look at Falcon

Time: 10:30 AM // Place: Nygaard-395

1510/4Megan ChenUniversally Composable Succinct Non-interactive Commitments and Applications
1327/3Katharina BoudgoustLeftover Hash Lemma(s) over Cyclotomic Rings - How to find the right one for your cryptosystem!
1113/3Ruben NiederhagenThe MEDS PQC Signature Scheme - How to not become a NIST standard
106/3Pierre Meyer"Infinity-rate garbling (where rate is defined as amount-of-useful-information-sent / total-size; I won't be taking any questions or remarks as to why we defined rate that way)"
423/1Chen-Da Liu-ZhangRecent Advancements in Communication-Efficient Asynchronous MPC
26/1Stella WohnigTime: 13.30 // Place: Nygaard-298

2024

WeekDateSpeakerTitle
4828/11Li QuanLT code and how it improves data availability sampling performance
4721/11Yansong FengExplicit Formulas for the Asymptotic Bound of Small Roots in Coppersmith’s Method
4431/10Nan ChengCommunication Optimization in SS-FSS Hybrid 2PC
4324/10Mark SimkinExtractable Witness Encryption for KZG Commitments and Efficient Laconic OT
3926/9Markus V. G. Jensen, Hans-Christian Kjeldsen, Andrekas S. NielsenVerifying ElectionGuard: a theoretical and empirical analysis
3819/9Mark SimkinThe Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing
3710/9Marcel Keller

MP-SPDZ at 6 and the State of Practical MPC

Time: 14.15 in Nygaard-295

2627/6Ivan DamgårdA lower bound on the communication in asynchronous MPC
2520/6Ignacio Amores SesarAre DAGs better than chains?
2413/6LaKyah TynerLower Bounds on Anonymous Whistleblowing
2016/5Kaartik BhushanBounded-Key Streaming Functional Encryption from Minimal Assumptions
1510/4Serge FehrKnowledge Soundness of Special-Sound Proofs
144/4Matteo CampanelliMerlin becomes greedy, obsessed with scalability and a knowledge show-off (Or: How to Make Rational Arguments Practical and Extractable)
929/2Damiano AbramCostant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output
928/2Aron van Baarsen

Fuzzy Private Set Intersection with Large Hyperballs

Time: 15.00 in Nygaard-295

822/2Pierre MeyerA Note on Low-Communication Secure Multiparty Computation via Circuit Depth-Reduction
68/2Pierre MeyerFast Public-Key Silent OT and More from Constrained Naor-Reingold

2023

WeekDateSpeakerTitle
496/11Ryo KikuchiSecure Statistical Analysis on Multiple Datasets: Join and Group-By
4830/11Kelong Cong

Flash-PSI: Efficient Fuzzy Labeled PSI

Time: Thursday at 13.00 // Place: Nygaard-295

4722/11Khanh NgocLattice-Based Polynomial Commitments: Towards Asymptotic and Concrete Efficiency
4615/11Diego Aranha, Lennart Braun, Jakob BurkhardtCCS 2023 - Speed Talks
458/11Sasha Lapiha"SIS-with-hints" assumptions, reductions and lattice-based polynomial commitments
441/11Sebastian KolbyUsing LaBRADOR to build aggregate signatures for Falcon
4325/10Marius ÅrdalOverview of LaBRADOR and how to prove its Fiat-Shamir security
3927/9PeterVOLE-in-the-Head and FAEST
3820/9Sihang PuLattice-based t-out-of-n Threshold Signatures
3819/9Laasya Bangalore

Differentially Private Distributed Mean Estimation with Malicious Security

Time: 14.00-15.00 / Place: Nygaard-295

3713/9Thomas PrestMasking-friendly signatures and the design of Raccoo
366/9Marius ÅrdalProving knowledge soundness of imperfect special sound protocols
3530/8Yash KondiThreshold ECDSA in Three Rounds
3423/8Tore FrederiksenIntroducing the fhEVM - Privacy preserving smart contracts using FHE
3314/8Julian LossNetwork-Agnostic Security Comes (Almost) for Free in DKG and MPC
2519/6Jesper Buus NielsenOn Valiant’s Conjecture
2412/6Amit AgarwalCommunication efficient secure logistic regression
2015/5Mathias Hall-Andersen

Dora -- The Branch Explorer

Place: Nygaard-184

143/4Nikolaj SchwartzbachThe Planted k-SUM Problem: Algorithms, Lower Bounds, Hardness Amplification, and Cryptography
1220/3Sabine OechsnerOn lower bounds for garbling scheme
1117/3Benedikt Wagner

Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions

Time: 14.00-15.00 / Place: Nygaard-295

1113/3

Julian Loss

Juan Garay

Gossiping for Communication-Efficient Broadcast

Universally Composable Almost-Everywhere Secure Computation

106/3Hiraku Morita Constant-Round Private Decision Tree Evaluation for Secret Shared Data
1028/2Yvonne MaoSecurity of the NIST SP800 108r1 Key Derivation Functions
927/2Corentin JeudyLattice Signature with Efficient Protocols, Application to Anonymous Credentials
820/2Lance RoyCan We Beat Three Halves Gates?
66/2Ivan DamgårdSecure DNA and distributed Exponentiation
424/1AbdelKarim Kati (Karim)Cryptanalysis Strikes Back, A Realistic assessment of leakage attacks on Encrypted Search

2022

WeekDateSpeakerTitle
481/12Ana Costache

On the Precision Loss in Approximate Homomorphic Encryption

Time: 11.00-12.00 / Place: Nygaard-295

4829/11Michael KlooßRelaxed Range Proofs
4723/11Anca Nitulescu

How to make it private? Content Routing Open Problems!

Time: 11.00-12.00 / Place: Nygaard-395

4722/11Jesper NielsenA Walk in the ORAM Forest / About oblivious RAMs and something about tree
4615/11Christian MajenzPost-quantum Security of Fiat-Shamir Signatures in the Quantum Random Oracle Model
459/11Maciej Obremski A New Model of Leakage
458/11Mark SimkinSquirrel: Efficient Synchronized Multi-Signatures from Lattices
441/11Katharina BoudgoustSimple Threshold (Fully Homomorphic) Encryption From LWE with Polynomial Modulus
4325/10Akira TakahashiWitness-Succinct Universally-Composable SNARKs
3820/9Yashvanth KondiOn the Role of Randomness in Straight-Line Extractable Compilers
352/9Orestis Alpos

Do not trust in numbers: Distributed cryptography and Byzantine quorum systems beyond thresholds

Time: 10.00-11.30 / Place: Nygaard-295

3529/8Tushar MopuriDew: Transparent Constant-sized zkSNARKs
3424/8

Sebastian Kolby

Anat Paskan-Cherniavsky

The State of the Union: Union-Only Signatures for Data Aggregation

On Perfectly Secure 2-party Computation of Symmetric Functionalities with Correlated Randomness

3210/8Ivan DamgårdSome observations on distributed key generation
274/7 Crypto Summer Day 2022
2627/6Dario FioreOn the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups
2125/5Sebastian KolbyThe State of the Union: Union-Only Signatures for Data Aggregation
1911/5Youssef El HousniSNARKs and elliptic curves
184/5Aurore GuillevicA crash course on pairing-friendly curves
1727/4Luisa SiniscalchiDelayed-Input MPC-in-the-Head and Applications to Black-Box Non-Malleable Commitments
15-1613/4-20/4 No seminar due to Easter
146/4Mary MallerZK-SNARKs: A plethora of ideas guaranteed to upset cryptographers
1331/3Bernardo David

Realising YOSO Communication Channels: Encryption to the Future and its efficient PVSS-friendly Instantiations

The talk will be held in Nygaard-327 from 15:00 to 16:00

1330/3Hannah KellerQuantifying identifiability to choose and audit epsilon in differentially private deep learning
1224/3Anca Nitulescu

Linear Map Vector Commitments and Applications

The talk will be held in Ada-333 from 15:00 to 16:00

1223/3Akira TakahashiVerifiable Encryption from MPC-in-the-Head
1116/3Mathias Hall-AndersenSecure Multiparty Computation with Free Branching
109/3Rahul RachuriLe Mans: Dynamic and Fluid MPC for Dishonest Majority
92/3Mahak PancholiFiat–Shamir Bulletproofs are Non-Malleable (in the Algebraic Group Model)
823/2Hamidreza KhoshakhlaghSNARKY Signatures with Universal and Updatable Setup
320/1Maciej Obremski

Wondrous journey through the land of Privacy Amplification

The tak will be held in the PBA Auditorium

    

2021

WeekDateSpeakerTitle
5016/12Thomas K.T. Mogensen and Jakob S. Villumsen

Thomas: MitID - The new NemID // Jakob: Implementing an OPRF

The talks will be held in Ada-333 (building 5342, room 333)

499/12Daniel Tschudi

Cutting Cake Equally

The talk will be held in PBA (building 5335, room 016)

482/12Luisa SiniscalchiRound-Optimal Multi-Party Computation with Identifiable Abort
4725/11Felix Engelmann

Highly Opinionated Introduction to using git for Collaborative Paper Writing

The talk will be held in Ada-333 (building 5342, room 333)

4618/11Petr SedláčekLimitations of incompressible encodings
4511/11Nico Döttling

Batch-OT with Optimal Rate

The talk will be held in the PBA Auditorium (building 5335, room 016)

444/11Damiano AbramDistributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round
4328/10Daniel Escudero

Information-Theoretically Secure MPC against Mixed Dynamic Adversaries

The talk will take place in Ada-333, building 5342, room 333

4221/10 Autumn Break
4114/10Ivan Damgård

An open problem in communication complexity of MPC

The talk will be held in the PBA Auditorium, building 5335/room 016

407/10Katharina BoudgoustHardness of Module Learning With Errors With Small Secrets
3930/9 No seminar due to EuroCrypt deadline
3823/9 CS Colloquium with Aurore Guillevic on "The knapsack algorithm in analytical chemistry"
3716/9Maciej ObremskiThe Mother of All Leakages
369/9Suvradip ChakrabortyCombining Forward-Security and Leakage-Resilience for Non-Interactive Key Exchange
352/9Nikolaj I. SchwartzbachSecure rational multi-party computation from publicly verifiable covert secure protocols
3426/8 No seminar due to PhD and Postdoc Retreat
33  No seminar
3212/8Jonathan BootleSumcheck Arguments and their Applications 
27-31  Summer Break
261-2/7 Crypto Summer Days
2310/6Matteo Campanelli and Felix EngelmannKey-value Commitments for Multi-token QuisQuis
223/6 No seminar 
2127/5Daniel EscuderoSecure Computation in a Unstable Network with Dropouts and Comebacks    
2020/5Mathias Hall-AndersenStacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions
1913/5 No seminar due to Ascension Day
186/5 No seminar
1729/4Ivan DamgårdWork-in-progress-talk
1622/4Nikolaj I. SchwartzbachGame theory on the blockchain: a model for games with smart contracts    
1515/4Peter Sebastian NordholtCross-Layer Deanonymization Methods in the Lightning Protocol 
148/4Thomas AttemaCompressed Σ-Protocol Theory
131/4-Easter break
1225/3Danilo FrancattiKolmogorov complexity and cryptography: New connections and applications to space-demanding functions
1118/3 No seminar
1011/3Katharina BoudgoustTowards aggregating lattice signatures
94/3Mahak PancholiReverse Firewalls for Adaptively Secure MPC without Setup
825/2 No seminar 
718/2Rasmus PaghOn the Power of Multiple Anonymous Messages
611/2Peter SchollThe Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT - The talk will start at 12:30.
54/2Carsten BaumBanquet: Short and Fast Signatures from AES

2020

   
52=>24/12=> Christmas Break
5114/12VariousAarhus Crypto Winter Day - Postponed to 2021 due to COVID-19
5010/12Aurore GuillevicFactoring RSA of 240 decimal digits and computing discrete logarithms in a 240-decimal-digit prime field with the same software and hardware
493/12Luisa SiniscalchiMultiparty Computation with Covert Security and Public Verifiability
4826/11Tjerand SildeLattice based shuffle and verifiable mixing networks
4719/11 No seminar
4612/11 No seminar
455/11Tore FrederiksenP2DEX: Privacy-Preserving Decentralized Exchange
4429/10Carsten BaumMac'n'Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions
4322/10Eduardo Soria-VazquezRinocchio: If you like SNARKs you should put a ring on them
4215/10--Autumn Break
401/10Salvatore IngalaFast Hash-Based Additive Accumulators