ECRYPT Logo

coordination & support action ECRYPT-CSA

research network ECRYPT-NET

ECRYPT-CSA Workshops & Schools

Workshop on Models and Tools for Security Analysis and Proofs

29 April 2017, Paris (France)

Organized by  BRIS Logo

Abstract: Designing and building secure systems is notoriously difficult. The combination of even simple cryptographic primitives with the distributed system aspects associated to typical applications makes even informal analysis a significant challenge. Higher levels of assurance requirethe creation of accurate models of the security goal andflawless execution ofmathematical proofs to show that protocols meetthe said goal. Symbolic (formal) methods are poised to play a key role in providing rigorous guarantee for cryptography-based systems. Such methods rely on tools and techniques from the areas of logic, program synthesis and verification. They allow for the (semi) automatic verification of proofs at various levels of abstractions and even for the generation of such proofs. Current state-of-the-art embodied by systems like Avispa, ProVerif, Tamrain, Crytoverif, Certicrypt, EasyCrypt can already treat interesting classes of protocols and provide automated cryptographic proofs.
The workshop will bring together leading European researchers and aims to identify research directions, key to increasing the reach and uptake of symbolic methods. The focus will be on medium and long term research programs focusing on composability, scalability and usability of such methods.

More >>>

Workshop on Random Number Generation (wr0ng 2017)

30 April 2017, Paris (France)

Organized by  CrypoExperts Logo

Abstract: All cryptographic constructions heavily rely on the availability of random bits, for operations such as key generation, randomization of encryption or signatures and or nonces in protocols. Unfortunately, multiple incidents have demonstrated that the quality of the (pseudo-)random number generators leaves much to be desired. Even worse, in September 2013 it was revealed that the US government agency has deliberately undermined the security of cryptographic solutions by inserting a backdoor in the Dual EC random number generator included in ANSI, NIST and ISO standards. This highlights that a secure system can be fatally weakened by the insertion of just one flawed component; if the NSA can predict all randomness used by a system, it knows all secrets used during that time period and might even be able to recover long-term keys.
In spite of their crucial importance, there are very few research papers on the topic and most industrial designs are proprietary. Moreover, existing designs and instances are notoriously difficult to evaluate.
The goal of this workshop is to review new models, constructions, implementations, and evaluation methodologies. It will also be explored whether the area is mature enough to identify requirements and plan an open competition. The workshop will cover both truly random number generators and pseudo-random number generators.

More >>>

Workshop on Cryptographic Protocols with Complex Functionalities

17 May 2017, Bristol (UK)

Organized by  BRIS Logo

Abstract: As cryptography becomes more ubiquitous the application domain increases. We are now seeing cryptographic solutions being proposed for a number of higher level application domains. Such domains include electronic voting, electronic auctions, and cloud protocols. Designing such protocols is a complex task, and the resulting protocols utilize many core cryptographic technologies.

Workshop on Hardware Benchmarking

7 June 2017, Bochum (Germany)

Organized by  RUB Logo

Due to the evolution of the ICT environment towards the Internet of Things, many nodes will be closely coupled with the underlying hardware. Moreover, the threat of quantum computers forces cryptographers to come up with high performance alternatives to widely used cryptographic systems such as RSA, and ECC; while several designs exist, the understanding of hardware performance is very limited. Both developments give the issue of hardware performance and security new urgency. We will investigate how meaningful benchmarks for hardware can be defined. In particular, we will investigate how to develop a benchmarking framework that structures benchmarks for efficient implementations according to various parameters such as area, power, energy, throughput or latency and combinations thereof. We will cover ASICs, FPGAs but also approaches based on hardware-software co-design. We note that meaningful benchmarks exist in related areas in the software domain, e.g., benchmarking of crypto algorithms as developed in the eBACS benchmarking framework. We also intend to develop a realistic comparison of a wide range of post-quantum proposals for several hardware platforms; this comparison should include requirements in terms of hardware instructions, computations, storage, randomness, and communication.

More >>>

Executive School on Post-Quantum Cryptography

22-23 June 2017, Eindhoven (The Netherlands)

Organized by  TUE Logo

Abstract: This two-day executive school will give a crash course on post-quantum cryptography. It is co-located with PQCrypto 2017 taking place in Utrecht during the next week June 2628, 2017.

More >>>

This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 645421.

H2020

Project reference: 645421
Start date: 01-03-2015
End date: 28-02-2018
Duration: 36 months

Project funding: 1.000.000
Programme: H2020
Call: H2020-ICT-2014-1
Action: Coordination & support action