CWI Cryptology Group Internal Seminar
Archives: [2026] [2025] [2024] [2023] [2022] [2021] [2020] [2019] [List of Speakers]Upcoming Event(s)
[print]
CWI Cryptology Group Internal Seminar
| Date: | 19.05.2026 |
| Location: | M290 |
| Schedule: | |
| 14:00 | David Wu (University of Texas at Austin): The Structured Generic Group Model Abstract: This paper introduces the structured generic-group model, an extension of Shoup’s generic-group model (from Eurocrypt 1997) to capture algorithms that take advantage of some non-generic structure of the group. We show that any discrete-log algorithm in a group of prime order that exploits the structure of at most a fraction of group elements, in a way that we precisely define, must run in time . As an application, we prove a tight subexponential-time lower bound against discrete-log algorithms that exploit the multiplicative structure of smooth integers, but that are otherwise generic. This lower bound applies to a broad class of index-calculus algorithms. We prove similar lower bounds against algorithms that exploit the structure of small integers, smooth polynomials, and elliptic-curve points.
|
[print]
CWI Cryptology Group Internal Seminar
| Date: | 29.04.2026 |
| Location: | M290/online |
| Schedule: | |
| 14:00 | Tim Beyne (KU Leuven): Observations on TETRA Encryption Algorithm TEA-3 Abstract: We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently.
While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not obviously weakened as TEA-{1,4,7} but (ii) in contrast to TEA-2 it is approved for extra-European emergency service, and (iii) as already noted by [MBW23] the TEA-3 design surprisingly contains a non-bijective S-box.
Most importantly, we show that the 80-bit non-linear feedback shift register operating on the key decomposes into a cascade of two 40-bit registers.
Although this hints at an intentional weakness at first glance, we are not able to lift our results to a practical attack.
Other than that, we show how the balanced non-linear feedback functions used in the state register of TEA-3 can be constructed.
|
Past 2026 Event(s)
| 15.04.2026 | CWI Cryptology Group Internal Seminar
|
| 08.04.2026 | CWI Cryptology Group Internal Seminar
|
| 2026-03-04 | CWI Cryptology Group Internal Seminar
|
| 2026-02-18 | CWI Cryptology Group Internal Seminar
|
| 2026-02-04 | CWI Cryptology Group Internal Seminar
|
| 2026-01-28 | CWI Cryptology Group Internal Seminar
|
| 2026-01-21 | CWI Cryptology Group Internal Seminar
|
| 2026-01-14 | CWI Cryptology Group Internal Seminar
|
| 2026-01-07 | CWI Cryptology Group Internal Seminar
|
0.00348s c
