-
Faculty position in Computer Science
Job Posting: Faculty position in Computer Science Free University of Brussels The Faculty of Sciences of the Université libre de Bruxelles (ULB) invites applications for a full-time academic position in Computer Science to begin October 1st, 2025. All areas of Computer Science, including Cryptography, will be considered. ULB and the Computer Science Department is strongly…
-
Post-doc in Cryptanalysis of Post-quantum Signatures
Job Posting: Post-doc in Cryptanalysis of Post-quantum Signatures SnT, University of Luxembourg (Esch-sur-Alzette, Luxembourg) CryptoLUX team at the University of Luxembourg searches for a post-doc to work on the PQseal project about cryptanalysis of post-quantum signatures. The duration of the position is 1.5 years (18 months), with planned start in March-April 2025. The postdoc will…
-
Workshop on secret sharing schemes
Event Calendar: Workshop on secret sharing schemes Tarragona, Spain, 12 May – 14 May 2025 Event date: 12 May to 14 May 2025 Go to Source
-
A New Method for Solving Discrete Logarithm Based on Index Calculus
ePrint Report: A New Method for Solving Discrete Logarithm Based on Index Calculus Jianjun HU Index Calculus (IC) algorithm is the most effective probabilistic algorithm for solving discrete logarithms over finite fields of prime numbers, and it has been widely applied to cryptosystems based on elliptic curves. Since the IC algorithm was proposed in 1920,…
-
Dynamically Available Common Subset
ePrint Report: Dynamically Available Common Subset Yuval Efron, Ertem Nusret Tas Internet-scale consensus protocols used by blockchains are designed to remain operational in the presence of unexpected temporary crash faults (the so-called sleepy model of consensus) — a critical feature for the latency-sensitive financial applications running on these systems. However, their leader-based architecture, where a…
-
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version)
ePrint Report: New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version) Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo This paper improves upon the quantum circuits required for the Shor’s attack on binary elliptic curves. We present two types of quantum point addition, taking both qubit count and circuit depth into consideration. In…
-
SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity
ePrint Report: SPY-PMU: Side-Channel Profiling of Your Performance Monitoring Unit to Leak Remote User Activity Md Kawser Bepary, Arunabho Basu, Sajeed Mohammad, Rakibul Hassan, Farimah Farahmandi, Mark Tehranipoor The Performance Monitoring Unit (PMU), a standard feature in all modern computing systems, presents significant security risks by leaking sensitive user activities through microarchitectural event data. This…
-
The Quantum Apocalypse: Your Encryption Will Fail And Even Your Bitcoin Will Be At Risk
Hackers have access to nearly every protected server in the world. We are at war! Technological war! Viable quantum computers should strike terror into online citizens of every country. Post-Quantum Cryptography Must Reach maturity – fast! Read All Hackers have access to nearly every protected server in the world. We are at war! Technological war!…
-
Navigating the Future of Secure Code Signing and Cryptography
In today’s interconnected world, the integrity of software has never been more critical. With the increasing reliance on open-source components and the complexities introduced by containerized applications, ensuring trust in software has become a cornerstone of modern security practices. I […] The post Navigating the Future of Secure Code Signing and Cryptography appeared first on…
-
CISO Challenges for 2025: Overcoming Cybersecurity Complexities
As organizations recognize the immense value and criticality of your data and systems, cybersecurity has become intrinsically linked to business strategy. Chief Information Security Officers (CISOs) are increasingly expected to play a central role in shaping business decisions, assessing and mitigating risks, and ensuring that security strategies align with overall business objectives. This requires a…