CWI Cryptology Group Internal Seminar

     Archives: [2026] [2025] [2024] [2023] [2022] [2021] [2020] [2019] [List of Speakers]

Upcoming Event(s)


[print]
CWI Cryptology Group Internal Seminar
Date:19.05.2026
Location:M290
Schedule: 
14:00David Wu (University of Texas at Austin):
The Structured Generic Group Model
Abstract: This paper introduces the structured generic-group model, an extension of Shoup’s generic-group model (from Eurocrypt 1997) to capture algorithms that take advantage of some non-generic structure of the group. We show that any discrete-log algorithm in a group of prime order that exploits the structure of at most a fraction of group elements, in a way that we precisely define, must run in time . As an application, we prove a tight subexponential-time lower bound against discrete-log algorithms that exploit the multiplicative structure of smooth integers, but that are otherwise generic. This lower bound applies to a broad class of index-calculus algorithms. We prove similar lower bounds against algorithms that exploit the structure of small integers, smooth polynomials, and elliptic-curve points.

[print]
CWI Cryptology Group Internal Seminar
Date:29.04.2026
Location:M290/online
Schedule: 
14:00Tim Beyne (KU Leuven):
Observations on TETRA Encryption Algorithm TEA-3
Abstract: We present a number of observations on TEA-3, a stream cipher used in TETRA radio networks that was kept secret until recently. While the same also holds for the six other TETRA encryption algorithms, we pick TEA-3 to start with, as (i) it is not obviously weakened as TEA-{1,4,7} but (ii) in contrast to TEA-2 it is approved for extra-European emergency service, and (iii) as already noted by [MBW23] the TEA-3 design surprisingly contains a non-bijective S-box. Most importantly, we show that the 80-bit non-linear feedback shift register operating on the key decomposes into a cascade of two 40-bit registers. Although this hints at an intentional weakness at first glance, we are not able to lift our results to a practical attack. Other than that, we show how the balanced non-linear feedback functions used in the state register of TEA-3 can be constructed.

Past 2026 Event(s)


15.04.2026CWI Cryptology Group Internal Seminar
  • Barbara Jiabao Benedikt (TU Darmstadt): The Order of Hashing in Fiat-Shamir Schemes
08.04.2026CWI Cryptology Group Internal Seminar
  • Tabitha Ogilvie (Royal Holloway University of London): On the Concrete Hardness Gap Between MLWE and LWE
2026-03-04CWI Cryptology Group Internal Seminar
  • Deep Inder Mohan (Georgia Tech): Generic and Algebraic Computation Models: When AGM Proofs Transfer to the GGM
2026-02-18CWI Cryptology Group Internal Seminar
  • Eugenio Paracucchi (CISPA Helmholtz Center for Information Security): Tanuki: New Frameworks for (Concurrently Secure) Blind Signatures from Post-Quantum Groups Actions
2026-02-04CWI Cryptology Group Internal Seminar
  • Valentina Frasca (University of Catania): On the (Un)biasability of Existing Verifiable Random Functions
2026-01-28CWI Cryptology Group Internal Seminar
  • Pierre Briaud (CNRS, University of Limoges): The Algebraic CheapLunch: Extending FreeLunch Attacks on Arithmetization-Oriented Primitives Beyond CICO-1
2026-01-21CWI Cryptology Group Internal Seminar
  • Yuxi Zheng (EPFL): How to Prove Post-Quantum Security for Succinct Non-Interactive Reductions
2026-01-14CWI Cryptology Group Internal Seminar
  • Jesko Dujmnovic (Northeastern University and Boston University): When Simple Permutations Mix Poorly
2026-01-07CWI Cryptology Group Internal Seminar
  • Kewen Wu (School of Mathematics at the Institute for Advanced Study): No exponential quantum speedup for SIS∞ anymore
0.00348s c