CINVESTAV-IPN's Computer Science Department hosted a seminar by Prof. Francisco Rodriguez-Henriquez on isogeny-based key exchange protocols. The talk reviewed Supersingular Isogeny-based Diffie-Hellman (SIDH) and Commutative Supersingular Isogeny-based Diffie-Hellman (CSIDH). Isogeny-based protocols offer short key sizes but have higher latency compared to other post-quantum cryptosystems. Why it matters: This seminar contributes to the exploration of post-quantum cryptography, an important area for ensuring data security against future quantum computing threats.
Prof. Daniel Panario gave a seminar on irreducible polynomials over finite fields and their applications in cryptography. The seminar covered how finite fields are used as basic components in many cryptographic applications. It surveyed families of irreducible polynomials and commented on their properties. Why it matters: The talk highlights the mathematical foundations and ongoing research relevant to cryptographic implementations in the region.
The National Institute of Standards and Technology (NIST) has been evaluating Post-Quantum Cryptography proposals since 2017. Lattice-based schemes have emerged as efficient candidates for Key Encapsulation Mechanisms (KEM) and Digital Signatures. This talk will cover the core operations within lattice-based schemes and efficient implementation strategies. Why it matters: As quantum computing advances, exploring and standardizing post-quantum cryptography is crucial for maintaining secure communication and data protection in the future.
Cryptography Research Center's Prof. Francisco Rodriguez-Henriquez and PhD candidate Jorge Chavez-Saab won a Best Paper Award ahead of Asiacrypt 2022. Their paper, "SwiftEC: Shallue-van de Woestijne Indifferentiable Function to Elliptic Curves," was written in collaboration with Mehdi Tibouchi of NTT. The paper presents an improved variation of the Elligator Squared technique for representing points of arbitrary elliptic curves as close-to-uniform random strings. Why it matters: The award recognizes important cryptographic research from the UAE, contributing to the advancement of secure digital solutions.
Professor Mike Scott will present a seminar at the Technology Innovation Institute's Cryptography Research Centre in the UAE. The seminar will focus on the challenges of keeping secrets safe from attackers in the context of cryptography. It will review proposed solutions, discuss use cases, and present a promising new approach. Why it matters: This seminar indicates TII's ongoing research and development efforts in advanced cryptography, a crucial area for secure digital infrastructure in the UAE and beyond.
Nadine El Naggar from City, University of London presented research on RNN learning of counting behavior, formalizing it as Dyck-1 acceptance. Empirically, RNN models struggle to learn exact counting and fail on longer sequences, even when weights are correctly initialized. Theoretically, Counter Indicator Conditions (CICs) were proposed and proven necessary/sufficient for exact counting in single-cell RNNs, but experiments show these CICs are not found or are unlearned during training. Why it matters: This work highlights challenges in RNNs learning systematic tasks, suggesting gradient descent-based optimization may not achieve exact counting behavior with standard setups.
The Technology Innovation Institute's Cryptography Research Center (CRC) in Abu Dhabi has appointed a Board of Advisors comprised of global cryptography experts. The board includes Prof. Joan Daemen, Prof. Lejla Batina, Dr. Guido Bertoni, Prof. Carlos Aguilar, Prof. Damien Stehlé, and Prof. Tim Güneysu. The advisors will guide CRC's research efforts in areas like post-quantum cryptography and hardware-based cryptography. Why it matters: This move strengthens the UAE's position as a global hub for cryptography research and development, fostering innovation in this critical field.
The Technology Innovation Institute (TII) has launched the "TII McEliece Challenges," the UAE's first cryptography challenges focused on evaluating the McEliece cryptosystem's hardness. The challenges, led by TII’s Cryptography Research Center (CRC), will present cryptanalysis problems across three tracks: Theoretical Key Recovery Algorithms, Practical Key Recovery, and Message Recovery. Participants can compete for a share of a US$75,000 prize pool by identifying vulnerabilities in the McEliece system. Why it matters: This initiative aims to enhance online security, foster local talent in cryptography, and strengthen the UAE's position in post-quantum encryption research.