Student seminar: security protocols and applications

COM-506

Media

COM-506 Student Seminar on Security Protocols and Applications

2025.05.26 - zkLogin

26.05.2025, 10:21

Presentation by Noe Mace, Pedro Laginhas Gouveia, and Gustave Charles-Saigne
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials

2025.05.19 - FROST

19.05.2025, 18:36

Presentation by Konrad Klier and Adrián Saiz De Pedro
FROST: Flexible Round-Optimized Schnorr Threshold Signatures

2025.05.19 - PMBT

19.05.2025, 18:30

Presentation by Julian Levkov and Jonas Sulzer
Efficient Anonymous Tokens with Private Metadata Bit


2025.05.12 - ECDSA Adaptor Signature

12.05.2025, 11:28

Presentation by Léonie Louise Dezempte and  Raphaël Flückiger
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps

2025.05.12 - Heavy Hitter

12.05.2025, 11:16

Presentation by Tapdig Maharramli and  Raymond Nasr
Lightweight Techniques for Private Heavy Hitters


2025.04.28 - Verifiable Delay Functions

30.04.2025, 07:32

Presentation by Changling Wang and Benjámin Selyem
Efficient verifiable delay functions

2025.04.28 - Side Channel on Falcon

30.04.2025, 07:28

Presentation by Adrien Alain Bouquet and Mehdi Aziz Jelassi
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon


2025.04.07 - LadderLeak

07.04.2025, 12:10

Presentation by Srushti Singh and Jonathan Poveda Colominas
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage

2025.04.07 - OPRF

07.04.2025, 12:02

Presentation by Srividya Subramanian, Lorenz Gerk, and Leonard Wilhelm
Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups

2025.03.31 - DiStefano

31.03.2025, 13:28

Presentation by Noah El Hassanie and Cristina Morad
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More

2025.03.31 - DECO

31.03.2025, 13:24

Presentation by Mina Petrovic, Iman Attia, and Bogdana Kolic
DECO: Liberating Web Data Using Decentralized Oracles for TLS

2025.03.17 - Fair Data Exchange

17.03.2025, 11:38

Presentation by Louis Pierre Yves Giraud, Engjëll Ismaili, and Brandy Lee Nogales Simon
Fair exchange on smart contracts

2025.03.17 - Fault Attack on SSH

17.03.2025, 11:30

Presentation by Roxanne Chevalley, Léopold Galhaud, and Paul Achille Tissot-Daguette
Passive SSH Key Compromise via Lattices


2025.03.10 - Binding Tokens

10.03.2025, 11:46

Presentation by Michael Greub and Luca Mattiussi
Token Binding over HTTP

2025.03.10 - Prio

10.03.2025, 11:38

Presentation by Federico Villa, Gabriele Stentella, and Octave Charrin
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics

2025.02.24 - Privacy Pass

24.02.2025, 10:34

Presentation by Serge Vaudenay
Anonymous Tokens

2025.02.17 - Anonymous Tokens

17.02.2025, 12:10

Presentation by Betül Durak
Security and Privacy Balance of Anonymous Tokens and Its Applications

2025.02.17 - Introduction

17.02.2025, 12:01

Introduction to COM-506

2024.05.06 - Side-Channel Attack on Kyber

06.05.2024, 13:02

Presentation by Cristian-Alexandru Botocan
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste

2024.05.06 - Isogeny-Based Commitment

06.05.2024, 13:00

Presentation by Eduarda Assunção, Valerio Ardizio and Parsa Tasbihgou
Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs


2024.04.29 - SEEMless

30.04.2024, 14:34

Presentation by Jean-Etienne Charbonnet, Louis Dumas and Daniel Mihai Baciu
SEEMless: Secure End-to-End Encrypted Messaging with less trust

2024.04.29 - Noise

30.04.2024, 14:32

Presentation by Etienne Mettaz, Jonas Gloning and Andreas Papon
Noise: a framework for building crypto protocols

2024.04.22 - Accumulators

22.04.2024, 11:24

Presentation by Rafael Wanner
Scaling Verifiable Computation Using Efficient Set Accumulators

2023.04.22 - Threshold ECDSA for DNSSEC

22.04.2024, 11:22

Presentation by Romino Damian Steiner & Marc Walter Schnek
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC

2024.03.18 - PKI

18.03.2024, 12:56

Presentation by Carlos Riviera
When PKI (finally) met Provable Security

2024.03.18 - Anonymous Credentials for Humans

18.03.2024, 12:53

Presentation by Lara Lenz and Leonhard Koblitz
How to Bind Anonymous Credentials to Humans

2024.03.11 - Time-Lock Encryption

11.03.2024, 13:12

Presentation by Christopher Williams, Stefan Popescu

tlock: Practical Timelock Encryption from Threshold BLS

2024.03.11 - Weak Fiat-Shamir

11.03.2024, 13:05

Presentation by Sandro Marchon, Franco Sainas, Burcu Yıldız
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios

2024.02.26 - Biometric research

26.02.2024, 12:25

Presentation by Serge Vaudenay
Biometric Research

2024.02.19 - Introduction

19.02.2024, 17:47

Introduction to the seminar

Serge Vaudenay

2023.05.08 - Fermat FHE

08.05.2023, 11:28

Presentation by Mehdi Berrada
Fully homomorphic encryption modulo Fermat numbers

2023.05.01 - ABY3

01.05.2023, 10:12

Presentation by Hongyi Shi
ABY3 : A Mixed Protocol Framework for Machine Learning

2023.04.17 - Mixnet based on Paillier

17.04.2023, 09:33

Presentation by Si An Oliver Tran & Endrit Vorfaj
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem

2023.04.03 - CSIDH

03.04.2023, 10:46

Presentation by Jacob Prud'homme & Theodor-Pierre Moroianu
CSIDH: An Efficient Post-Quantum Commutative Group Action

2023.03.20 - Threema and Express

20.03.2023, 10:01

Presentation 1 by Oliver Dudler & Jean-Claude Graf
Three Lessons From Threema: Analysis of a Secure Messenger

Presentation 2 by David Schmid & Simon Jacob
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy

2023.03.13 - Nonce-Based Cryptography

13.03.2023, 10:08

Presentation by Andreina Motter
Nonce-based cryptography : Retaining Security when Randomness Fails

2023.02.27 - GlobalID Research

27.02.2023, 11:32

Presentation by Serge Vaudenay

2023.02.20 - Anonymous Tokens with Hidden Metadata Bit

21.02.2023, 12:50

Introduction to COM-506 + presentation by Betül Durak

2022.05.16 - 5G Authentication

16.05.2022, 12:08

Çagin Tanir

Model-Checking 5G Security and 5G SUCI

2022.05.16 - ECDSA ring signature

16.05.2022, 12:05

Ganyuan Cao, Djian Post

ZkAttest: Ring and Group Signatures on top of existing ECDSA keys

2022.05.09 - Partitioning oracle attacks

09.05.2022, 16:14

Leonardo Pennino, Louis Bettens

Partitioning Oracle Attacks

2022.04.25 - SSO

25.04.2022, 13:37

Isis Daudé,  Fabio Aliberti

SSO Wars: The Token Menace & Abusing JWT public keys without the public key

2022.04.25 - OAUTH2

25.04.2022, 13:34

Kamila Babayeva, Stefan Weber and Nico Hauser

The OAuth 2.0 Authorization Framework

2022.04.11 - CNN power analysis

11.04.2022, 14:13

Auguste Baum

Methodology for Efficient CNN Architectures in Profiling Attacks

2022.04.11 - Camera fingerprint

11.04.2022, 14:09

Marin Nguyen, Mounir Taha  and Ladina Julia Roffler

On the Security and Applicability of Fragile Camera Fingerprints

2022.04.04 - Privacy Pass

04.04.2022, 17:10

Lúcás Meier, Majdouline Yahia

Privacy Pass: Bypassing Internet Challenges Anonymously

2022.04.04 - ROS Attack

04.04.2022, 17:06

Max Duparc, Christophe Marciot

On the (in)security of ROS

2022.03.28 - Yubico for WebAuthn

28.03.2022, 15:34

Manon Michel, Maëlys Billon, Tom Demont

Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn

2022.03.28 - Racoon attack on TLS1.2

28.03.2022, 15:25

Léa Micheloud and David Dervishi

Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)

2022.03.14 - Linkability of e-passports

21.03.2022, 11:26

Michael Paper, Yann Aguettaz and Guilhem Niot

Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity

2022.02.28 - Swisscovid privacy

28.02.2022, 15:37

Security and Privacy with SwissCovid

2022.02.21 - Intro & Oblivious Shuffling

21.02.2022, 15:14

Introduction to the seminar

Aggregate Measurement via Oblivious Shuffling

Erik Anderson, Melissa Chase, F. Betul Durak, Esha Ghosh, Kim Laine, Chenkai Weng

2021.05.31 - NFCGate

31.05.2021, 10:14

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit

Maxime Fellrath, Martin Cibils and Stéphanie Bulela

2021.05.17 - Signal

17.05.2021, 10:39

A Formal Security Analysis of the Signal Messaging Protocol

Pascal Schärli, Jordi Subirà and Andrej Gorjan

2021.05.10 - Postquantum TLS

10.05.2021, 12:32

Post-quantum TLS without handshake signatures

Bérangère Colbois, Louis Leclair and Lucas D. Meier

2021.05.03 - Private Authentication

03.05.2021, 10:26

Privacy-Preserving Authentication - From Theory to Practice

Matthieu Ehlers, Matthieu Gras and Julien Biefer

2021.04.26 - Hash Collisions

26.04.2021, 10:37

Exploiting Hash Collisions

Maxime Fellrath, Martin Cibils and Julien Biefer

2021.04.19 - Zoom Encryption

19.04.2021, 10:20

E2E Encryption and Identity Properties for Zoom Meetings

Bérangère Colbois, Louis Leclair and Vialar Louis Michel Jean-Luc

2021.04.12 - Moscow e-Voting

12.04.2021, 10:16

Breaking the Encryption Scheme of the Moscow Internet Voting System

Karim Kabbani, Matthias Franke and Pascal Schärli

2021.04.12 - Robust Channels

12.04.2021, 10:14

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

Arduin Brandts and Nicolas Rolin

2021.03.29 - Zerologon

29.03.2021, 10:15

The Zerologon vulnerability in the Microsoft Netlogon Protocol

Matthieu Ehlers, Matthieu Gras and Vialar Louis Michel Jean-Luc

2021.03.29 - HTTP Desync

29.03.2021, 10:12

HTTP Desync Attacks: Request Smuggling Reborn

Arduin Brandts, Karim Kabbani and Nicolas Rolin

2021.03.22 - WireGuard

22.03.2021, 11:06

The WireGuard Protocol (replacement for VPNs)

Matthias Franke, Andrej Gorjan and Jordi Subirà

2021.03.01 - e-voting

01.03.2021, 10:57

Individual verifiability in the e-voting system of swiss Post

Philippe Oechslin

2021.02.22 - SwissCovid

24.02.2021, 18:57

The dark side of swisscovid

Serge Vaudenay

2021.02.22 - Introduction

24.02.2021, 18:54

Introduction to the seminar

Serge Vaudenay


Media

COM-506 Student Seminar on Security Protocols and Applications

2025.05.26 - zkLogin

26.05.2025, 10:21

Presentation by Noe Mace, Pedro Laginhas Gouveia, and Gustave Charles-Saigne
zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials

2025.05.19 - FROST

19.05.2025, 18:36

Presentation by Konrad Klier and Adrián Saiz De Pedro
FROST: Flexible Round-Optimized Schnorr Threshold Signatures

2025.05.19 - PMBT

19.05.2025, 18:30

Presentation by Julian Levkov and Jonas Sulzer
Efficient Anonymous Tokens with Private Metadata Bit


2025.05.12 - ECDSA Adaptor Signature

12.05.2025, 11:28

Presentation by Léonie Louise Dezempte and  Raphaël Flückiger
Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps

2025.05.12 - Heavy Hitter

12.05.2025, 11:16

Presentation by Tapdig Maharramli and  Raymond Nasr
Lightweight Techniques for Private Heavy Hitters


2025.04.28 - Verifiable Delay Functions

30.04.2025, 07:32

Presentation by Changling Wang and Benjámin Selyem
Efficient verifiable delay functions

2025.04.28 - Side Channel on Falcon

30.04.2025, 07:28

Presentation by Adrien Alain Bouquet and Mehdi Aziz Jelassi
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon


2025.04.07 - LadderLeak

07.04.2025, 12:10

Presentation by Srushti Singh and Jonathan Poveda Colominas
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage

2025.04.07 - OPRF

07.04.2025, 12:02

Presentation by Srividya Subramanian, Lorenz Gerk, and Leonard Wilhelm
Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups

2025.03.31 - DiStefano

31.03.2025, 13:28

Presentation by Noah El Hassanie and Cristina Morad
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More

2025.03.31 - DECO

31.03.2025, 13:24

Presentation by Mina Petrovic, Iman Attia, and Bogdana Kolic
DECO: Liberating Web Data Using Decentralized Oracles for TLS

2025.03.17 - Fair Data Exchange

17.03.2025, 11:38

Presentation by Louis Pierre Yves Giraud, Engjëll Ismaili, and Brandy Lee Nogales Simon
Fair exchange on smart contracts

2025.03.17 - Fault Attack on SSH

17.03.2025, 11:30

Presentation by Roxanne Chevalley, Léopold Galhaud, and Paul Achille Tissot-Daguette
Passive SSH Key Compromise via Lattices


2025.03.10 - Binding Tokens

10.03.2025, 11:46

Presentation by Michael Greub and Luca Mattiussi
Token Binding over HTTP

2025.03.10 - Prio

10.03.2025, 11:38

Presentation by Federico Villa, Gabriele Stentella, and Octave Charrin
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics

2025.02.24 - Privacy Pass

24.02.2025, 10:34

Presentation by Serge Vaudenay
Anonymous Tokens

2025.02.17 - Anonymous Tokens

17.02.2025, 12:10

Presentation by Betül Durak
Security and Privacy Balance of Anonymous Tokens and Its Applications

2025.02.17 - Introduction

17.02.2025, 12:01

Introduction to COM-506

2024.05.06 - Side-Channel Attack on Kyber

06.05.2024, 13:02

Presentation by Cristian-Alexandru Botocan
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste

2024.05.06 - Isogeny-Based Commitment

06.05.2024, 13:00

Presentation by Eduarda Assunção, Valerio Ardizio and Parsa Tasbihgou
Commitment Schemes from Supersingular Elliptic Curve Isogeny Graphs


2024.04.29 - SEEMless

30.04.2024, 14:34

Presentation by Jean-Etienne Charbonnet, Louis Dumas and Daniel Mihai Baciu
SEEMless: Secure End-to-End Encrypted Messaging with less trust

2024.04.29 - Noise

30.04.2024, 14:32

Presentation by Etienne Mettaz, Jonas Gloning and Andreas Papon
Noise: a framework for building crypto protocols

2024.04.22 - Accumulators

22.04.2024, 11:24

Presentation by Rafael Wanner
Scaling Verifiable Computation Using Efficient Set Accumulators

2023.04.22 - Threshold ECDSA for DNSSEC

22.04.2024, 11:22

Presentation by Romino Damian Steiner & Marc Walter Schnek
Securing DNSSEC Keys via Threshold ECDSA From Generic MPC

2024.03.18 - PKI

18.03.2024, 12:56

Presentation by Carlos Riviera
When PKI (finally) met Provable Security

2024.03.18 - Anonymous Credentials for Humans

18.03.2024, 12:53

Presentation by Lara Lenz and Leonhard Koblitz
How to Bind Anonymous Credentials to Humans

2024.03.11 - Time-Lock Encryption

11.03.2024, 13:12

Presentation by Christopher Williams, Stefan Popescu

tlock: Practical Timelock Encryption from Threshold BLS

2024.03.11 - Weak Fiat-Shamir

11.03.2024, 13:05

Presentation by Sandro Marchon, Franco Sainas, Burcu Yıldız
How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios

2024.02.26 - Biometric research

26.02.2024, 12:25

Presentation by Serge Vaudenay
Biometric Research

2024.02.19 - Introduction

19.02.2024, 17:47

Introduction to the seminar

Serge Vaudenay

2023.05.08 - Fermat FHE

08.05.2023, 11:28

Presentation by Mehdi Berrada
Fully homomorphic encryption modulo Fermat numbers

2023.05.01 - ABY3

01.05.2023, 10:12

Presentation by Hongyi Shi
ABY3 : A Mixed Protocol Framework for Machine Learning

2023.04.17 - Mixnet based on Paillier

17.04.2023, 09:33

Presentation by Si An Oliver Tran & Endrit Vorfaj
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem

2023.04.03 - CSIDH

03.04.2023, 10:46

Presentation by Jacob Prud'homme & Theodor-Pierre Moroianu
CSIDH: An Efficient Post-Quantum Commutative Group Action

2023.03.20 - Threema and Express

20.03.2023, 10:01

Presentation 1 by Oliver Dudler & Jean-Claude Graf
Three Lessons From Threema: Analysis of a Secure Messenger

Presentation 2 by David Schmid & Simon Jacob
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy

2023.03.13 - Nonce-Based Cryptography

13.03.2023, 10:08

Presentation by Andreina Motter
Nonce-based cryptography : Retaining Security when Randomness Fails

2023.02.27 - GlobalID Research

27.02.2023, 11:32

Presentation by Serge Vaudenay

2023.02.20 - Anonymous Tokens with Hidden Metadata Bit

21.02.2023, 12:50

Introduction to COM-506 + presentation by Betül Durak

2022.05.16 - 5G Authentication

16.05.2022, 12:08

Çagin Tanir

Model-Checking 5G Security and 5G SUCI

2022.05.16 - ECDSA ring signature

16.05.2022, 12:05

Ganyuan Cao, Djian Post

ZkAttest: Ring and Group Signatures on top of existing ECDSA keys

2022.05.09 - Partitioning oracle attacks

09.05.2022, 16:14

Leonardo Pennino, Louis Bettens

Partitioning Oracle Attacks

2022.04.25 - SSO

25.04.2022, 13:37

Isis Daudé,  Fabio Aliberti

SSO Wars: The Token Menace & Abusing JWT public keys without the public key

2022.04.25 - OAUTH2

25.04.2022, 13:34

Kamila Babayeva, Stefan Weber and Nico Hauser

The OAuth 2.0 Authorization Framework

2022.04.11 - CNN power analysis

11.04.2022, 14:13

Auguste Baum

Methodology for Efficient CNN Architectures in Profiling Attacks

2022.04.11 - Camera fingerprint

11.04.2022, 14:09

Marin Nguyen, Mounir Taha  and Ladina Julia Roffler

On the Security and Applicability of Fragile Camera Fingerprints

2022.04.04 - Privacy Pass

04.04.2022, 17:10

Lúcás Meier, Majdouline Yahia

Privacy Pass: Bypassing Internet Challenges Anonymously

2022.04.04 - ROS Attack

04.04.2022, 17:06

Max Duparc, Christophe Marciot

On the (in)security of ROS

2022.03.28 - Yubico for WebAuthn

28.03.2022, 15:34

Manon Michel, Maëlys Billon, Tom Demont

Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn

2022.03.28 - Racoon attack on TLS1.2

28.03.2022, 15:25

Léa Micheloud and David Dervishi

Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)

2022.03.14 - Linkability of e-passports

21.03.2022, 11:26

Michael Paper, Yann Aguettaz and Guilhem Niot

Breaking Unlinkability of the ICAO 9303 Standard for e-Passports using Bisimilarity

2022.02.28 - Swisscovid privacy

28.02.2022, 15:37

Security and Privacy with SwissCovid

2022.02.21 - Intro & Oblivious Shuffling

21.02.2022, 15:14

Introduction to the seminar

Aggregate Measurement via Oblivious Shuffling

Erik Anderson, Melissa Chase, F. Betul Durak, Esha Ghosh, Kim Laine, Chenkai Weng

2021.05.31 - NFCGate

31.05.2021, 10:14

NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit

Maxime Fellrath, Martin Cibils and Stéphanie Bulela

2021.05.17 - Signal

17.05.2021, 10:39

A Formal Security Analysis of the Signal Messaging Protocol

Pascal Schärli, Jordi Subirà and Andrej Gorjan

2021.05.10 - Postquantum TLS

10.05.2021, 12:32

Post-quantum TLS without handshake signatures

Bérangère Colbois, Louis Leclair and Lucas D. Meier

2021.05.03 - Private Authentication

03.05.2021, 10:26

Privacy-Preserving Authentication - From Theory to Practice

Matthieu Ehlers, Matthieu Gras and Julien Biefer

2021.04.26 - Hash Collisions

26.04.2021, 10:37

Exploiting Hash Collisions

Maxime Fellrath, Martin Cibils and Julien Biefer

2021.04.19 - Zoom Encryption

19.04.2021, 10:20

E2E Encryption and Identity Properties for Zoom Meetings

Bérangère Colbois, Louis Leclair and Vialar Louis Michel Jean-Luc

2021.04.12 - Moscow e-Voting

12.04.2021, 10:16

Breaking the Encryption Scheme of the Moscow Internet Voting System

Karim Kabbani, Matthias Franke and Pascal Schärli

2021.04.12 - Robust Channels

12.04.2021, 10:14

Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3

Arduin Brandts and Nicolas Rolin

2021.03.29 - Zerologon

29.03.2021, 10:15

The Zerologon vulnerability in the Microsoft Netlogon Protocol

Matthieu Ehlers, Matthieu Gras and Vialar Louis Michel Jean-Luc

2021.03.29 - HTTP Desync

29.03.2021, 10:12

HTTP Desync Attacks: Request Smuggling Reborn

Arduin Brandts, Karim Kabbani and Nicolas Rolin

2021.03.22 - WireGuard

22.03.2021, 11:06

The WireGuard Protocol (replacement for VPNs)

Matthias Franke, Andrej Gorjan and Jordi Subirà

2021.03.01 - e-voting

01.03.2021, 10:57

Individual verifiability in the e-voting system of swiss Post

Philippe Oechslin

2021.02.22 - SwissCovid

24.02.2021, 18:57

The dark side of swisscovid

Serge Vaudenay

2021.02.22 - Introduction

24.02.2021, 18:54

Introduction to the seminar

Serge Vaudenay


This file is part of the content downloaded from Student seminar: security protocols and applications.

General information

We will look at today's most popular security protocols and new kinds of techniques and problems that will play an emerging role in the future. This course will be held as a seminar, in which the students shall actively participate. Groups of 2-3 students will give 30-minute talks, answer to other students' questions and write a 3-4 pages summary report on the selected topic. The talks have to be given in English (some students do not speak French). A copy of the slides and report (in pdf format, also provided by each team) shall be made available online on Friday before each presentation.

When and where

Monday 8:15 - 10:00 (BC02 and Zoom, password =COM-506)

Presentation topics

These are the available topics for your presentations :

#1  Efficient Anonymous Tokens with Private Metadata Bit

#2: Client-Auditable Verifiable Registries

#3: Prio: Private, Robust, and Scalable Computation of Aggregate Statistics

#4: A Fast and Simple Partially Oblivious PRF, with Applications

#5: Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps

#6: LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage

#7: DECO: Liberating Web Data Using Decentralized Oracles for TLS

#8: On Valiant’s Conjecture: Impossibility of Incrementally Verifiable Computation from Random Oracles

#9: FROST: Flexible Round-Optimized Schnorr Threshold Signatures

#10: Constant-Size Commitments to Polynomials and Their Applications

#11: CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability

#12: Token Binding over HTTP

#13: Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups

#14: Picnic: Post Quantum Signatures

#15: Cryptographic Smooth Neighbors

#16: Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance

#17: Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability

#18: Passive SSH Key Compromise via Lattices

#19: Lightweight Techniques for Private Heavy Filters

#20: Quantum Lightning Never Strikes the Same State Twice

#21: Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs

#22: Fair exchange on smart contracts

#23: zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials

#24: Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets

#25: Multivariate Blind Signatures Revisited

#26: Rapidash: Foundations of Side-Contract-Resilient Fair Exchange

#27: MPC in the head using the subfield bilinear collision problem

#28: How to Prove False Statements: Practical Attacks on Fiat-Shamir

#29: DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More

#30: Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate

#31: The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon

#32: How (not) to Use Welch's T-test in Side-Channel Security Evaluations

#33: Random-Oracle Uninstantiability from Indistinguishability Obfuscation

#34: Relational Hash

#35: Breaking SIDH in polynomial time

#36: Constant time lattice reduction in dimension 4 with application to SQIsign

#37: More Practical Single-Trace Attacks on the Number Theoretic Transform

#38: Efficient verifiable delay functions

#39: SQISignHD: New Dimensions in Cryptography

#40: On Protecting SPHINCS+ Against Fault Attacks


Descriptions of the topics can be found in the "Presentation Topics" PDF file below.

For students who have not yet done so, please have one person per group fill the "Presentation Registration Form" available below.

A topic will be assigned on a first-come-first-served basis according to your priority list. You are expected to submit your preferences before 21.02.2025 11:59 PM. (This deadline is not strict but it is important to have all the groups formed as soon as possible for everyone to have enough time for preparation).

Finding group members

You can use the discussion forum to find other members interested in similar topics. Alternatively, you can submit your preferences without a group and we will assign you to a group.

Organization of the seminar

  • All the information about the organization of this seminar can be found in the introductory slides below.
  • All the organizational updates will be announced through the news forum.
  • Please keep in mind that your slides and report must be submitted by Friday noon before your presentation to Max Duparc.

Lecture recordings

Lecture recordings are posted here in due course after the lecture has taken place.

A previous year's presentations

You can find examples of reports and slides from another seminar here.


Week 1 (17.02.2025)

8:15 - Introduction to the seminar course by Serge Vaudenay 

9:15 - Lecture by Betül Durak.


Week 2 (24.02.2025)

9:15 - Presentation by Serge Vaudenay.


Week 3 (03.03.2025)


No course this week



Week 4 (10.03.2025)

8.15am: Federico Villa, Gabriele Stentella & Octave Charrin
Topic
: #3: Prio: Private, Robust, and Scalable Computation of Aggregate Statistics


9.15am: Michael Greub, Luca Mattiussi
Topic
: #12: Token Binding over HTTP


Week 5 (17.03.2025)

8.15am: Roxanne Chevalley, Léopold Galhaud & Paul Achille Tissot-Daguette
Topic
#18: Passive SSH Key Compromise via Lattices

9.15am
: Louis Pierre Yves, Giraud Engjëll & Ismaili Brandy Lee Nogales Simon
Topic
#22: Fair exchange on smart contracts


Week 6 (24.04.2025)

No presentation today



Week 7 (31.03.2025)

8.15am: Mina Petrovic Iman Attia Bogdana Kolic
Topic
#7: DECO: Liberating Web Data Using Decentralized Oracles for TLS

9.15am
: Noah El Hassanie Cristina Morad
Topic
#29: DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More


Week 8 (07.04.2025)

8.15amSrividya Subramanian Lorenz Gerk Leonard Wilhelm
Topic
: #13: Oblivious Pseudorandom Functions (OPRFs) using Prime-Order Groups

9.15am: Srushti Singh Jonathan Poveda Colominas
Topic
: #6: LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage


Week 9 (14.04.2025)

No presentation today


Holidays (21.04.2025)


Week 10 (28.04.2025)

8.15am: Adrien Alain Bouquet Mehdi Aziz Jelassi
Topic
: #31: The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon


9.15am: Changling Wang Benjámin Selyem
Topic
: #38: Efficient verifiable delay functions


Week 11 (05.05.2025)

No presentation today



Week 12 (12.05.2025)

8.15am: Tapdig Maharramli,  Raymond Nasr
Topic
: #19: Lightweight Techniques for Private Heavy Hitters

9.15am
: Léonie Louise Dezempte,  Raphaël Flückiger
Topic
: #5: Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps


Week 13 (19.05.2025)

8.15am: Julian Levkov & Jonas Sulzer
Topic: #1: Efficient Anonymous Tokens with Private Metadata Bit

9.15am: Konrad Klier & Adrián Saiz De Pedro
Topic: #9: FROST: Flexible Round-Optimized Schnorr Threshold Signatures

Week 14 (26.05.2022)

8.15am
Topic


9.15am
: Noe Mace, Pedro Laginhas Gouveia & Gustave Charles-Saigne
Topic
: #23: zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials


Week X (31.05.2021) "TEMPLATE"

8.15am
Topic


9.15am

Topic