Student seminar: security protocols and applications
COM-506
Media
COM-506 Student Seminar on Security Protocols and Applications
2025.05.26 - zkLogin
26.05.2025, 10:21
Presentation by Noe Mace, Pedro Laginhas Gouveia, and Gustave Charles-Saigne
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
2025.05.19 - FROST
19.05.2025, 18:36
2025.05.19 - PMBT
19.05.2025, 18:30
2025.05.12 - ECDSA Adaptor Signature
12.05.2025, 11:28
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
2025.05.12 - Heavy Hitter
12.05.2025, 11:16
2025.04.28 - Verifiable Delay Functions
30.04.2025, 07:32
Presentation by Changling Wang and Benjámin Selyem
Efficient verifiable delay functions
2025.04.28 - Side Channel on Falcon
30.04.2025, 07:28
Presentation by Adrien Alain Bouquet and Mehdi Aziz Jelassi
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
2025.04.07 - LadderLeak
07.04.2025, 12:10
Presentation by Srushti Singh and Jonathan Poveda Colominas
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
2025.04.07 - OPRF
07.04.2025, 12:02
2025.03.31 - DiStefano
31.03.2025, 13:28
2025.03.31 - DECO
31.03.2025, 13:24
2025.03.17 - Fair Data Exchange
17.03.2025, 11:38
2025.03.17 - Fault Attack on SSH
17.03.2025, 11:30
2025.03.10 - Binding Tokens
10.03.2025, 11:46
2025.03.10 - Prio
10.03.2025, 11:38
2025.02.24 - Privacy Pass
24.02.2025, 10:34
2025.02.17 - Anonymous Tokens
17.02.2025, 12:10
2025.02.17 - Introduction
17.02.2025, 12:01
2024.05.06 - Side-Channel Attack on Kyber
06.05.2024, 13:02
2024.05.06 - Isogeny-Based Commitment
06.05.2024, 13:00
2024.04.29 - SEEMless
30.04.2024, 14:34
2024.04.29 - Noise
30.04.2024, 14:32
2024.04.22 - Accumulators
22.04.2024, 11:24
Presentation by Rafael Wanner
Scaling Verifiable Computation Using Efficient Set Accumulators
2023.04.22 - Threshold ECDSA for DNSSEC
22.04.2024, 11:22
2024.03.18 - PKI
18.03.2024, 12:56
2024.03.18 - Anonymous Credentials for Humans
18.03.2024, 12:53
Presentation by Lara Lenz and Leonhard Koblitz
How to Bind Anonymous Credentials to Humans
2024.03.11 - Time-Lock Encryption
11.03.2024, 13:12
2024.03.11 - Weak Fiat-Shamir
11.03.2024, 13:05
Presentation by Sandro Marchon, Franco Sainas, Burcu Yıldız
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
2024.02.26 - Biometric research
26.02.2024, 12:25
2024.02.19 - Introduction
19.02.2024, 17:47
Introduction to the seminar
Serge Vaudenay
2023.05.08 - Fermat FHE
08.05.2023, 11:28
2023.05.01 - ABY3
01.05.2023, 10:12
2023.04.17 - Mixnet based on Paillier
17.04.2023, 09:33
2023.04.03 - CSIDH
03.04.2023, 10:46
2023.03.20 - Threema and Express
20.03.2023, 10:01
2023.03.13 - Nonce-Based Cryptography
13.03.2023, 10:08
2023.02.27 - GlobalID Research
27.02.2023, 11:32
Presentation by Serge Vaudenay
2023.02.20 - Anonymous Tokens with Hidden Metadata Bit
21.02.2023, 12:50
Introduction to COM-506 + presentation by Betül Durak
2022.05.16 - 5G Authentication
16.05.2022, 12:08
Çagin Tanir
Model-Checking 5G Security and 5G SUCI
2022.05.16 - ECDSA ring signature
16.05.2022, 12:05
Ganyuan Cao, Djian Post
ZkAttest: Ring and Group Signatures on top of existing ECDSA keys
2022.05.09 - Partitioning oracle attacks
09.05.2022, 16:14
Leonardo Pennino, Louis Bettens
Partitioning Oracle Attacks
2022.04.25 - SSO
25.04.2022, 13:37
Isis Daudé, Fabio Aliberti
SSO Wars: The Token Menace & Abusing JWT public keys without the public key
2022.04.25 - OAUTH2
25.04.2022, 13:34
Kamila Babayeva, Stefan Weber and Nico Hauser
The OAuth 2.0 Authorization Framework
2022.04.11 - CNN power analysis
11.04.2022, 14:13
Auguste Baum
Methodology for Efficient CNN Architectures in Profiling Attacks
2022.04.11 - Camera fingerprint
11.04.2022, 14:09
Marin Nguyen, Mounir Taha and Ladina Julia Roffler
On the Security and Applicability of Fragile Camera Fingerprints
2022.04.04 - Privacy Pass
04.04.2022, 17:10
Lúcás Meier, Majdouline Yahia
Privacy Pass: Bypassing Internet Challenges Anonymously
2022.04.04 - ROS Attack
04.04.2022, 17:06
Max Duparc, Christophe Marciot
On the (in)security of ROS
2022.03.28 - Yubico for WebAuthn
28.03.2022, 15:34
Manon Michel, Maëlys Billon, Tom Demont
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
2022.03.28 - Racoon attack on TLS1.2
28.03.2022, 15:25
Léa Micheloud and David Dervishi
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
2022.03.14 - Linkability of e-passports
21.03.2022, 11:26
Michael Paper, Yann Aguettaz and Guilhem Niot
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity
2022.02.28 - Swisscovid privacy
28.02.2022, 15:37
Security and Privacy with SwissCovid
2022.02.21 - Intro & Oblivious Shuffling
21.02.2022, 15:14
Introduction to the seminar
Aggregate Measurement via Oblivious Shuffling
Erik Anderson, Melissa Chase, F. Betul Durak, Esha Ghosh, Kim Laine, Chenkai Weng
2021.05.31 - NFCGate
31.05.2021, 10:14
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit
Maxime Fellrath, Martin Cibils and Stéphanie Bulela
2021.05.17 - Signal
17.05.2021, 10:39
A Formal Security Analysis of the Signal Messaging Protocol
Pascal Schärli, Jordi Subirà and Andrej Gorjan
2021.05.10 - Postquantum TLS
10.05.2021, 12:32
Post-quantum TLS without handshake signatures
Bérangère Colbois, Louis Leclair and Lucas D. Meier
2021.05.03 - Private Authentication
03.05.2021, 10:26
Privacy-Preserving Authentication - From Theory to Practice
Matthieu Ehlers, Matthieu Gras and Julien Biefer
2021.04.26 - Hash Collisions
26.04.2021, 10:37
Exploiting Hash Collisions
Maxime Fellrath, Martin Cibils and Julien Biefer
2021.04.19 - Zoom Encryption
19.04.2021, 10:20
E2E Encryption and Identity Properties for Zoom Meetings
Bérangère Colbois, Louis Leclair and Vialar Louis Michel Jean-Luc
2021.04.12 - Moscow e-Voting
12.04.2021, 10:16
Breaking the Encryption Scheme of the Moscow Internet Voting System
Karim Kabbani, Matthias Franke and Pascal Schärli
2021.04.12 - Robust Channels
12.04.2021, 10:14
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Arduin Brandts and Nicolas Rolin
2021.03.29 - Zerologon
29.03.2021, 10:15
The Zerologon vulnerability in the Microsoft Netlogon Protocol
Matthieu Ehlers, Matthieu Gras and Vialar Louis Michel Jean-Luc
2021.03.29 - HTTP Desync
29.03.2021, 10:12
HTTP Desync Attacks: Request Smuggling Reborn
Arduin Brandts, Karim Kabbani and Nicolas Rolin
2021.03.22 - WireGuard
22.03.2021, 11:06
The WireGuard Protocol (replacement for VPNs)
Matthias Franke, Andrej Gorjan and Jordi Subirà
2021.03.01 - e-voting
01.03.2021, 10:57
Individual verifiability in the e-voting system of swiss Post
Philippe Oechslin
2021.02.22 - SwissCovid
24.02.2021, 18:57
The dark side of swisscovid
Serge Vaudenay
2021.02.22 - Introduction
24.02.2021, 18:54
Introduction to the seminar
Serge Vaudenay
Media
COM-506 Student Seminar on Security Protocols and Applications
2025.05.26 - zkLogin
26.05.2025, 10:21
Presentation by Noe Mace, Pedro Laginhas Gouveia, and Gustave Charles-Saigne
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
2025.05.19 - FROST
19.05.2025, 18:36
2025.05.19 - PMBT
19.05.2025, 18:30
2025.05.12 - ECDSA Adaptor Signature
12.05.2025, 11:28
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
2025.05.12 - Heavy Hitter
12.05.2025, 11:16
2025.04.28 - Verifiable Delay Functions
30.04.2025, 07:32
Presentation by Changling Wang and Benjámin Selyem
Efficient verifiable delay functions
2025.04.28 - Side Channel on Falcon
30.04.2025, 07:28
Presentation by Adrien Alain Bouquet and Mehdi Aziz Jelassi
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
2025.04.07 - LadderLeak
07.04.2025, 12:10
Presentation by Srushti Singh and Jonathan Poveda Colominas
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
2025.04.07 - OPRF
07.04.2025, 12:02
2025.03.31 - DiStefano
31.03.2025, 13:28
2025.03.31 - DECO
31.03.2025, 13:24
2025.03.17 - Fair Data Exchange
17.03.2025, 11:38
2025.03.17 - Fault Attack on SSH
17.03.2025, 11:30
2025.03.10 - Binding Tokens
10.03.2025, 11:46
2025.03.10 - Prio
10.03.2025, 11:38
2025.02.24 - Privacy Pass
24.02.2025, 10:34
2025.02.17 - Anonymous Tokens
17.02.2025, 12:10
2025.02.17 - Introduction
17.02.2025, 12:01
2024.05.06 - Side-Channel Attack on Kyber
06.05.2024, 13:02
2024.05.06 - Isogeny-Based Commitment
06.05.2024, 13:00
2024.04.29 - SEEMless
30.04.2024, 14:34
2024.04.29 - Noise
30.04.2024, 14:32
2024.04.22 - Accumulators
22.04.2024, 11:24
Presentation by Rafael Wanner
Scaling Verifiable Computation Using Efficient Set Accumulators
2023.04.22 - Threshold ECDSA for DNSSEC
22.04.2024, 11:22
2024.03.18 - PKI
18.03.2024, 12:56
2024.03.18 - Anonymous Credentials for Humans
18.03.2024, 12:53
Presentation by Lara Lenz and Leonhard Koblitz
How to Bind Anonymous Credentials to Humans
2024.03.11 - Time-Lock Encryption
11.03.2024, 13:12
2024.03.11 - Weak Fiat-Shamir
11.03.2024, 13:05
Presentation by Sandro Marchon, Franco Sainas, Burcu Yıldız
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios
2024.02.26 - Biometric research
26.02.2024, 12:25
2024.02.19 - Introduction
19.02.2024, 17:47
Introduction to the seminar
Serge Vaudenay
2023.05.08 - Fermat FHE
08.05.2023, 11:28
2023.05.01 - ABY3
01.05.2023, 10:12
2023.04.17 - Mixnet based on Paillier
17.04.2023, 09:33
2023.04.03 - CSIDH
03.04.2023, 10:46
2023.03.20 - Threema and Express
20.03.2023, 10:01
2023.03.13 - Nonce-Based Cryptography
13.03.2023, 10:08
2023.02.27 - GlobalID Research
27.02.2023, 11:32
Presentation by Serge Vaudenay
2023.02.20 - Anonymous Tokens with Hidden Metadata Bit
21.02.2023, 12:50
Introduction to COM-506 + presentation by Betül Durak
2022.05.16 - 5G Authentication
16.05.2022, 12:08
Çagin Tanir
Model-Checking 5G Security and 5G SUCI
2022.05.16 - ECDSA ring signature
16.05.2022, 12:05
Ganyuan Cao, Djian Post
ZkAttest: Ring and Group Signatures on top of existing ECDSA keys
2022.05.09 - Partitioning oracle attacks
09.05.2022, 16:14
Leonardo Pennino, Louis Bettens
Partitioning Oracle Attacks
2022.04.25 - SSO
25.04.2022, 13:37
Isis Daudé, Fabio Aliberti
SSO Wars: The Token Menace & Abusing JWT public keys without the public key
2022.04.25 - OAUTH2
25.04.2022, 13:34
Kamila Babayeva, Stefan Weber and Nico Hauser
The OAuth 2.0 Authorization Framework
2022.04.11 - CNN power analysis
11.04.2022, 14:13
Auguste Baum
Methodology for Efficient CNN Architectures in Profiling Attacks
2022.04.11 - Camera fingerprint
11.04.2022, 14:09
Marin Nguyen, Mounir Taha and Ladina Julia Roffler
On the Security and Applicability of Fragile Camera Fingerprints
2022.04.04 - Privacy Pass
04.04.2022, 17:10
Lúcás Meier, Majdouline Yahia
Privacy Pass: Bypassing Internet Challenges Anonymously
2022.04.04 - ROS Attack
04.04.2022, 17:06
Max Duparc, Christophe Marciot
On the (in)security of ROS
2022.03.28 - Yubico for WebAuthn
28.03.2022, 15:34
Manon Michel, Maëlys Billon, Tom Demont
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn
2022.03.28 - Racoon attack on TLS1.2
28.03.2022, 15:25
Léa Micheloud and David Dervishi
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
2022.03.14 - Linkability of e-passports
21.03.2022, 11:26
Michael Paper, Yann Aguettaz and Guilhem Niot
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity
2022.02.28 - Swisscovid privacy
28.02.2022, 15:37
Security and Privacy with SwissCovid
2022.02.21 - Intro & Oblivious Shuffling
21.02.2022, 15:14
Introduction to the seminar
Aggregate Measurement via Oblivious Shuffling
Erik Anderson, Melissa Chase, F. Betul Durak, Esha Ghosh, Kim Laine, Chenkai Weng
2021.05.31 - NFCGate
31.05.2021, 10:14
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit
Maxime Fellrath, Martin Cibils and Stéphanie Bulela
2021.05.17 - Signal
17.05.2021, 10:39
A Formal Security Analysis of the Signal Messaging Protocol
Pascal Schärli, Jordi Subirà and Andrej Gorjan
2021.05.10 - Postquantum TLS
10.05.2021, 12:32
Post-quantum TLS without handshake signatures
Bérangère Colbois, Louis Leclair and Lucas D. Meier
2021.05.03 - Private Authentication
03.05.2021, 10:26
Privacy-Preserving Authentication - From Theory to Practice
Matthieu Ehlers, Matthieu Gras and Julien Biefer
2021.04.26 - Hash Collisions
26.04.2021, 10:37
Exploiting Hash Collisions
Maxime Fellrath, Martin Cibils and Julien Biefer
2021.04.19 - Zoom Encryption
19.04.2021, 10:20
E2E Encryption and Identity Properties for Zoom Meetings
Bérangère Colbois, Louis Leclair and Vialar Louis Michel Jean-Luc
2021.04.12 - Moscow e-Voting
12.04.2021, 10:16
Breaking the Encryption Scheme of the Moscow Internet Voting System
Karim Kabbani, Matthias Franke and Pascal Schärli
2021.04.12 - Robust Channels
12.04.2021, 10:14
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
Arduin Brandts and Nicolas Rolin
2021.03.29 - Zerologon
29.03.2021, 10:15
The Zerologon vulnerability in the Microsoft Netlogon Protocol
Matthieu Ehlers, Matthieu Gras and Vialar Louis Michel Jean-Luc
2021.03.29 - HTTP Desync
29.03.2021, 10:12
HTTP Desync Attacks: Request Smuggling Reborn
Arduin Brandts, Karim Kabbani and Nicolas Rolin
2021.03.22 - WireGuard
22.03.2021, 11:06
The WireGuard Protocol (replacement for VPNs)
Matthias Franke, Andrej Gorjan and Jordi Subirà
2021.03.01 - e-voting
01.03.2021, 10:57
Individual verifiability in the e-voting system of swiss Post
Philippe Oechslin
2021.02.22 - SwissCovid
24.02.2021, 18:57
The dark side of swisscovid
Serge Vaudenay
2021.02.22 - Introduction
24.02.2021, 18:54
Introduction to the seminar
Serge Vaudenay
General information
We will look at today's most popular security protocols and new kinds of techniques and problems that will play an emerging role in the future. This course will be held as a seminar, in which the students shall actively participate. Groups of 2-3 students will give 30-minute talks, answer to other students' questions and write a 3-4 pages summary report on the selected topic. The talks have to be given in English (some students do not speak French). A copy of the slides and report (in pdf format, also provided by each team) shall be made available online on Friday before each presentation.
When and where
Monday 8:15 - 10:00 (BC02 and Zoom, password =COM-506)
Presentation topicsThese are the available topics for your presentations :
#1 Efficient Anonymous Tokens with Private Metadata Bit
#2: Client-Auditable Verifiable Registries
#3: Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
#4: A Fast and Simple Partially Oblivious PRF, with Applications
#5: Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
#6: LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
#7: DECO: Liberating Web Data Using Decentralized Oracles for TLS
#8: On Valiant’s Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles
#9: FROST: Flexible Round-Optimized Schnorr Threshold Signatures
#10: Constant-Size Commitments to Polynomials and Their Applications
#11: CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
#12: Token Binding over HTTP
#13: Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups
#14: Picnic: Post Quantum Signatures
#15: Cryptographic Smooth Neighbors
#16: Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance
#17: Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability
#18: Passive SSH Key Compromise via Lattices
#19: Lightweight Techniques for Private Heavy Filters
#20: Quantum Lightning Never Strikes the Same State Twice
#21: Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs
#22: Fair exchange on smart contracts
#23: zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
#24: Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets
#25: Multivariate Blind Signatures Revisited
#26: Rapidash: Foundations of Side-Contract-Resilient Fair Exchange
#27: MPC in the head using the subfield bilinear collision problem
#28: How to Prove False Statements: Practical Attacks on Fiat-Shamir
#29: DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More
#30: Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
#31: The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
#32: How (not) to Use Welch's T-test in Side-Channel Security Evaluations
#33: Random-Oracle Uninstantiability from Indistinguishability Obfuscation
#34: Relational Hash
#35: Breaking SIDH in polynomial time
#36: Constant time lattice reduction in dimension 4 with application to SQIsign
#37: More Practical Single-Trace Attacks on the Number Theoretic Transform
#38: Efficient verifiable delay functions
#39: SQISignHD: New Dimensions in Cryptography
#40: On Protecting SPHINCS+ Against Fault Attacks
For students who have not yet done so, please have one person per group fill the "Presentation Registration Form" available below.
A topic will be assigned on a first-come-first-served basis according to your priority list. You are expected to submit your preferences before 21.02.2025 11:59 PM. (This deadline is not strict but it is important to have all the groups formed as soon as possible for everyone to have enough time for preparation).
Finding group members
You can use the discussion forum to find other members interested in similar topics. Alternatively, you can submit your preferences without a group and we will assign you to a group.
Organization of the seminar
- All the information about the organization of this seminar can be found in the introductory slides below.
- All the organizational updates will be announced through the news forum.
- Please keep in mind that your slides and report must be submitted by Friday noon before your presentation to Max Duparc.
Lecture recordings
Lecture recordings are posted here in due course after the lecture has taken place.
A previous year's presentations
You can find examples of reports and slides from another seminar here.
- News forum (Forum)
- Discussion Forum (Forum)
- Presentation Topics (File)
- Presentation Registration Form (Feedback)
- Introductory Slides 2025 (File)
- Schedule 2025 (File)
Week 1 (17.02.2025)
8:15 - Introduction to the seminar course by Serge Vaudenay
9:15 - Lecture by Betül Durak.
Week 2 (24.02.2025)
9:15 - Presentation by Serge Vaudenay.
Week 3 (03.03.2025)
No course this week
Week 4 (10.03.2025)
8.15am: Federico Villa, Gabriele Stentella & Octave Charrin
Topic: #3: Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
9.15am: Michael Greub, Luca Mattiussi
Topic: #12: Token Binding over HTTP
- Feedback for #3 (Feedback)
- #3 Report (File)
- #3 Slides (File)
- Feedback for #12 (Feedback)
- #12 Report (File)
- #12 Slides (File)
Week 5 (17.03.2025)
8.15am: Roxanne Chevalley, Léopold Galhaud & Paul Achille Tissot-Daguette
Topic: #18: Passive SSH Key Compromise via Lattices
9.15am: Louis Pierre Yves, Giraud Engjëll & Ismaili Brandy Lee Nogales Simon
Topic: #22: Fair exchange on smart contracts
- Feedback for #18 (Feedback)
- # 18 Report (File)
- #18 Slides (File)
- Feedback for #22 (Feedback)
- #22 Report (File)
- #22 Slides (File)
Week 6 (24.04.2025)
No presentation today
Week 7 (31.03.2025)
8.15am: Mina Petrovic Iman Attia Bogdana Kolic
Topic: #7: DECO: Liberating Web Data Using Decentralized Oracles for TLS
9.15am: Noah El Hassanie Cristina Morad
Topic: #29: DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More
- Feedback for #7 (Feedback)
- #7 Report (File)
- # 7 Slides (File)
- Feedback for #29 (Feedback)
- # 29 Report (File)
- # 29 Slides (File)
Week 8 (07.04.2025)
8.15am: Srividya Subramanian Lorenz Gerk Leonard Wilhelm
Topic: #13: Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups
9.15am: Srushti Singh Jonathan Poveda Colominas
Topic: #6: LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage
- Feedback for #13 (Feedback)
- #13 Report (File)
- #13 Slides (File)
- Feedback for #6 (Feedback)
- #6 Report (File)
- #6 Slides (File)
Week 9 (14.04.2025)
No presentation today
Holidays (21.04.2025)
Week 10 (28.04.2025)
8.15am: Adrien Alain Bouquet Mehdi Aziz Jelassi
Topic: #31: The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
9.15am: Changling Wang Benjámin Selyem
Topic: #38: Efficient verifiable delay functions
- Feedback for #31 (Feedback)
- #31 Report (File)
- #31 Slides (File)
- Feedback for #38 (Feedback)
- #38 Report (File)
- #38 Slides (File)
Week 11 (05.05.2025)
No presentation today
Week 12 (12.05.2025)
8.15am: Tapdig Maharramli, Raymond Nasr
Topic: #19: Lightweight Techniques for Private Heavy Hitters
9.15am: Léonie Louise Dezempte, Raphaël Flückiger
Topic: #5: Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
- Feedback for #19 (Feedback)
- #19 Report (File)
- #19 Slides (File)
- Feedback for #5 (Feedback)
- #5 Report (File)
- #5 Slides (File)
Week 13 (19.05.2025)
Topic: #1: Efficient Anonymous Tokens with Private Metadata Bit
9.15am: Konrad Klier & Adrián Saiz De Pedro
Topic: #9: FROST: Flexible Round-Optimized Schnorr Threshold Signatures
- Feedback for #1 (Feedback)
- #1 Report (File)
- #1 Slides (File)
- Feedback for #9 (Feedback)
- #9 Report (File)
- #9 Slides (File)
Week 14 (26.05.2022)
8.15am:
Topic:
9.15am: Noe Mace, Pedro Laginhas Gouveia & Gustave Charles-Saigne
Topic: #23: zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
Week X (31.05.2021) "TEMPLATE"
8.15am:
Topic:
9.15am:
Topic: