News & Events

Here we are giving you a peek into what keeps us busy, motivated and happy day in and day out.

IACR logo

Cryptography in a Changing World: Navigating Geopolitical Uncertainty and Security Risks - Eurocrypt Community Event

Martin Albrecht and Kenny Paterson are the organizers of a community event at this year's Eurocrypt in Madrid.

The event aims to set up a discusson on what we as a community can and should do in light of a dramatically changing domestic and international political landscape. It will take place on Wednesday, May 7, 14:30-16:00 (Room Callao, 3rd floor).

 

Kenny Paterson

IACR Distinguished Lecture: Kenny Paterson

The IACR Distinguished Lecture is an annual honour recognizing researchers who have made important contributions to cryptology.

Kenny Paterson has been awarded this year's Distinguished Lecture, and will be presenting at Eurocrypt in Madrid, on Tuesday, May 6, at 14:30. You can follow it in person or online if you are registered to the conference.

04.05.2025

CAW Logo

Cryptographic Applications Workshop at Eurocrypt 25

The second edition of the Cryptographic Applications Workshop will be hosted as an associated event at this year's Eurocrypt in Madrid, on Sunday.

CAW focuses on the construction and analysis of cryptography built for practice. Inspired by the Real World Crypto Symposium, it aims to provide a forum for cryptographers in academia and industry to exchange ideas and insights, bridging the gap between research and real-world applications.

CAW is brought to you by Matilda Backendal, Miro Haller, Laura Hetz and Matteo Scarlata.

03.05.2025

Peer2PIR: Private Queries for IPFS at S&P 2025

The InterPlanetary File System (IPFS) is a peer-to-peer network for storing data in a distributed file system, hosting over 190,000 peers spanning 152 countries. Despite its prominence, IPFS has very limited privacy guarantees, leaking every query in the network to the peers.   In a recent work, Miti Mazmudar, Shannon Veitch and Rasoul Akhavan Mahdavi try to fix that, integrating state-of-art PIR protocols in the context of distributed systems. "Peer2PIR: Private Queries for IPFS" will be presented this May at S&P in San Francisco.

24.04.2025

 

AC Group at YRCS

The Applied Crypto Group took part in this spring's edition of the Young Researcher Crypto Seminar, hosted by University of Konstanz.

 

Our group members presented:
"Probabilistic Data Structures in Adversarial Settings" - Mia Filic
- "D(e)rive with Care: Lessons Learned from Analyzing Real-World Multi-Input Key Derivation Functions" - Sebastian Clermont (TU Darmstadt) and Matteo Scarlata
- "Two-Server Authenticated Private Information Retrieval with Client-Preprocessing" - Laura Hetz

05.03.2025

Rune visits the Applied Crypto Group

Rune Fielder is in the fifth year of his PhD at TU Darmstadt, under the supervision of Prof. Marc Fischlin.

Rune visited the AC group last week, and presented his work on "BUFFing signatures, post-quantum Signal, and deniable authentication with malicious verifiers”.

We have a record of successful collaborations with Marc and his group, and we enjoyed learning more about Rune's research!

03.03.2025

Applied Crypto at Eurocrypt 2025 - Madrid

Some of our work will appear at Eurocrypt this spring!

- "On the Soundness of Algebraic Attacks against Code-based Assumptions" by Simon-Philipp Merz, Miguel Cueto Noval, Patrick Stählin, Akin Ünal.
- "Key Derivation Functions Without a Grain of Salt" by Matilda Backendal, Sebastian Clermont, Marc Fischlin and Felix Günther.
- "Analysis of the Telegram Key Exchange" by Martin R. Albrecht, Lenka Mareková, Kenny Paterson, Eyal Ronen, Igors Stepanovs.

Looking forward to the talks!

03.02.2025

AC group members at a whiteboard.

Applied Crypto Group Retreat

The Applied Crypto Group is back after a refreshing retreat in the Swiss alps! Our annual retreats are an occasion for the group to exercise teamwork, start interesting new research, and enjoy the staggering beauty of our country with hikes and winter sports.

03.02.2025

Mia

Welcome back Mia!

Our longest-standing non-permanent member Mia has just came back from 6 months internship at HP Security Labs in Bristol! Now back, Mia is excited to apply new insights and continue growing as a researcher in the realm of Applied Cryptography!

28.01.2025

IACR logo

Applied Crypto at RWC 2025 - Sofia

The Applied Cryptography Group will have a strong presence at this year's RWC, with 5 talks from our group accepted to the programme!

  • "Breaking and Fixing Length Leakage in Content-Defined Chunking", by Kien Tuong Truong, Matteo Scarlata, Simon-Phillipp Merz, Felix Günther and Kenny Paterson.
  • "D(e)rive with Care: Lessons Learned from Analyzing Real-World Multi-Input Key Derivation Functions", by Matilda Backendal, Sebastian Clermont, Marc Fischlin, Felix Günther, Miro Haller and Matteo Scarlata.
  • "Mind the Gap! Secure File Sharing, from Theory to Practice", by Matilda Backendal, David Balbás, Nicola Dardanis, Miro Haller and Matteo Scarlata.
  • “Kemeleon: Elligator-like Obfuscation for Post-Quantum Cryptography”, by Felix Günther, Michael Rosenberg, Douglas Stebila and Shannon Veitch.
  • "Provable Security for End-to-End Encrypted Cloud Storage", by Matilda Backendal, Hannah Davis, Felix Günther, Miro Haller, Kenny Paterson.

We look forward to sharing our research with the wider cryptographic community, and to network with all the awesome people attending RWC! See you in Sofia!

27.01.2025

Enlarged view: Usenix logo

Applied Crypto at Usenix Security 25

Francesca Falzon will be presenting her work with Tianxin Tang, a former postdoc in our group, titled "Learning from Functionality Outputs: Private Join and Compute (PJC) in the Real World" at this year's Usenix Security Symposium in August 2025.

PJC, a two-party protocol proposed by Google, is used for applications like ad conversion and generalizes their private set intersection sum protocol. It enables two parties with key-value databases to privately compute the inner product of values with intersecting keys. Although the output of this functionality is not usually included in the security model of multi-party computation (MPC), it could pose privacy risks in real-world applications.

Francesca and Tianxin's work examines these risks, focusing on an adversary within the protocol who could exploit four practical attacks to compromise the other party's input privacy. The study underscores the importance of considering functionality output in the MPC security model to mitigate these threats.

20.01.2025

Matilda starts her internship at Apple

Matilda is off to Cupertino this semester. She will be working with Apple's cryptographic team.

We look forward to having her back in May!

19.01.2025

JavaScript has been disabled in your browser