Crypto 2021

August 15-19 2021


Affiliated Events

Conference for Failed Approaches and Insightful Losses in Cryptology (CFail)

Saturday August 14 2021
Contact: contact information for CFail workshop

Abstract: CFAIL is the first conference dedicated to disseminating insightful failures of the cryptology research community.

Workshop website Submit to the workshop

Mentoring Workshop and Videos

Saturday August 14 2021
Contact: TBA

Abstract: This workshop aims to provide advice for researchers in early stages (students and junior faculty) and women researchers in the area of cryptography. The workshop will bring together cryptography researchers at different stages of their career to form panels and answer questions for these groups. Besides the live events, the organizers will turn to a large group of cryptography researchers and collect pre- recorded answers and advice from them on a list of interesting questions. These answers will be combined into a set of videos showing various perspectives and be publicly available for the community. As the outcome of this workshop, our mission is to foster a friendly environment where the community can openly share their academic experiences.

Workshop website coming soon

Workshop on Reduction Proofs in Pseudocode (WRePP)

Saturday August 14 2021
Contact: Chris Brzuska and Sabine Oechsner

Abstract: The study of cryptographic proofs has been an active field of research for over 20 years, since cryptographic constructions and security proofs are notoriously complex. Currently, there are two prominent lines of research that seek to support cryptographic reasoning:

  • Game hopping as a methodology for proving security w.r.t. game-based security notions was popularized by Shoup1 and Bellare and Rogaway2 who introduced code- based game-playing. The Bellare-Rogaway approach was later formalized in EasyCrypt.
  • Composition frameworks such as Universal Composability by Canetti3 and Abstract Cryptography by Maurer and Renner4 answer the orthogonal question of modular protocol analysis. They provide a framework for syntactically describing protocol composition and its effect on security.

In this workshop, we hope to break down some of the access barriers of the field for those interested in proofs for complex protocols and hope to provide inspiration also to experienced protocol designers and analysts.

The workshop has three goals:

  • Introduce state-separating proofs (SSP)5, one of the more recent additions to the crypto proof zoo that combines the code-based game-playing approach with compositionality.
  • Present new proof techniques in key exchange and secure multi- party computation which leverage the usefulness of SSP.
  • Provide a platform for discussion and exchange to promote mutual understanding in the field of cryptographic proofs and composition.
  • 1 Victor Shoup: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive 2004: 332 (2004)
  • 2 Mihir Bellare, Phillip Rogaway: The Security of Triple Encryption and a Framework fo Code-Based Game-Playing Proofs. EUROCRYPT 2006
  • 3 Ran Canetti: Universally Composable Security: A New Paradigm for Cryptographic Protocols. FOCS 2001
  • 4 Ueli Maurer, Renato Renner: Abstract Cryptography. ICS 2011
  • 5 Chris Brzuska, Antoine Delignat-Lavaud, Cedric Fournet, Konrad Kohbrok, Markulf Kohlweiss: State Separation for Code-Based Game-Playing Proofs. ASIACRYPT 2018
Workshop website

MathCrypt 2021

Sunday August 15 2021
Contact: contact information for MathCrypt workshop

Abstract: MathCrypt aims to provide a forum for exchanging ideas on new mathematical assumptions and attacks in cryptography, and to encourage and attract new researchers to work in the area of mathematical cryptography. Its scope includes, but is not limited to:

  • Introducing new assumptions which can be used to construct or improve cryptographic schemes.
  • Proposing new attacks on cryptographic assumptions, including new approaches which are not currently viable but have future promise.
  • Implementation improvements for cryptographic schemes and attacks.
Workshop website Submit to the workshop

Privacy-Preserving Machine Learning Workshop (PPML)

Sunday August 15 2021
Contact: contact information for PPML workshop

Abstract: Artificial intelligence is progressing rapidly. Systems based on machine learning algorithms approach and sometimes even exceed the abilities of human experts. Applications of machine learning involve almost every aspect of our lives, from health care and DNA sequence classification, to financial markets, computer networks and many more. Machine learning algorithms perform better when being exposed to more and more data, but such data is not always accessible due to privacy constraints. Can we train machine learning algorithms on confidential data without ever being exposed to it? Can my model classify your sample without ever seeing it?

The workshop aims to strengthen collaborations among the machine learning and cryptography communities. The scope includes privacy preserving techniques for training, inference, and disclosure. The workshop will consist of few invited talks, together with contributed talks.

Workshop website

Workshop on Attacks in Cryptography (WAC)

Sunday August 15 2021
Contact: contact information for WAC workshop

Abstract: Cryptography is often thought of as the bright spot of practical security, a mathematical paradise where security can be rigorously proven and issues like buffer overflows are in someone else’s department. However, there is a growing community of researchers who regularly find serious flaws in widely deployed cryptographic implementations and protocols. In recent years, this type of research has mostly been published in systems security conferences. This workshop will bring together researchers who work on cryptographic attacks and provide a showcase of their work for the Crypto community. This is the fourth edition of the Workshop on Attacks in Cryptography (WAC) workshop, which has been established by Nadia Heninger.

Workshop website coming soon