-
Cycles and Cuts in Supersingular L-Isogeny Graphs
ePrint Report: Cycles and Cuts in Supersingular L-Isogeny Graphs Sarah Arpin, Ross Bowden, James Clements, Wissam Ghantous, Jason T. LeGrow, Krystal Maughan Supersingular elliptic curve isogeny graphs underlie isogeny-based cryptography. For isogenies of a single prime degree $ell$, their structure has been investigated graph-theoretically. We generalise the notion of $ell$-isogeny graphs to $L$-isogeny graphs (studied…
-
Shadowfax: Combiners for Deniability
ePrint Report: Shadowfax: Combiners for Deniability Phillip Gajland, Vincent Hwang, Jonas Janneck As cryptographic protocols transition to post-quantum security, most adopt hybrid solutions combining pre-quantum and post-quantum assumptions. However, this shift often introduces trade-offs in terms of efficiency, compactness, and in some cases, even security. One such example is deniability, which enables users, such as…
-
Error floor prediction with Markov models for QC-MDPC codes
ePrint Report: Error floor prediction with Markov models for QC-MDPC codes Sarah Arpin, Jun Bo Lau, Ray Perlner, Angela Robinson, Jean-Pierre Tillich, Valentin Vasseur Quasi-cyclic moderate-density parity check (QC-MDPC) code-based encryption schemes under iterative decoders offer highly-competitive performance in the quantum-resistant space of cryptography, but the decoding-failure rate (DFR) of these algorithms are not well-understood.…
-
Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World
ePrint Report: Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World Sayani Sinha, Sikhar Patranabis, Debdeep Mukhopadhyay We propose the first $textit{distributed}$ version of a simple, efficient, and provably quantum-safe pseudorandom function (PRF). The distributed PRF (DPRF) supports arbitrary threshold access structures based on the hardness of the well-studied Learning with Rounding…
-
Quantum function secret sharing
ePrint Report: Quantum function secret sharing Alex B. Grilo, Ramis Movassagh We propose a quantum function secret sharing scheme in which the communication is exclusively classical. In this primitive, a classical dealer distributes a secret quantum circuit $C$ by providing shares to $p$ quantum parties. The parties on an input state $ket{psi}$ and a projection…
-
Researcher in Cryptographic Protocols and Key Exchange
Job Posting: Researcher in Cryptographic Protocols and Key Exchange Technology Innovation Institute (TII), Abu Dhabi, UAE We are looking for a permanent researcher to join the Cryptographic Protocols team within the Cryptography Research Center (CRC) at TII. The main task of the team is to conduct applied academic research and assist in product development, spanning…
-
3 priorities for adopting proactive identity and access security in 2025
If 2024 taught us anything, it’s that a proactive, no-compromises approach to security is essential for 2025 and beyond. Nation-states and advanced cybercriminals are making significant investments in infrastructure and automation to intensify familiar cyberattack patterns; password attacks, for example, escalated from 579 incidents per second in 20211 to 7,000 in 2024.2 These groups are…
-
How the Main Frame Became the Mainframe: an Etymological Dissertation
In his most recent article, [Ken Shirriff] takes a break from putting ASICs under a microscope, and instead does the same in a proverbial manner with the word ‘mainframe’. Although these days the word ‘mainframe’ brings to mind a lumbering behemoth of a system that probably handles things like finances and other business things, but…
-
Fast-track generative AI security with Microsoft Purview
As a data security global black belt, I help organizations secure AI solutions. They are concerned about data oversharing, data leaks, compliance, and other potential risks. Microsoft Purview is Microsoft’s solution for securing and governing data in generative AI. I’m often asked how long it takes to deploy Microsoft Purview. The answer depends on the…
-
Giving a Proprietary Power Supply the Boot
You’ve probably noticed that everywhere you go — the doctor’s office, hotels, or retail shops, there are tiny PCs everywhere. These small PCs often show up on the surplus market for a very good price, but they aren’t quite full-blown PCs. They usually have little option for expansion and are made to be cheap and…