March 30th, 2021 | 46 mins 30 secs
Did Schnorr "destroy RSA" with his surprising ePrint submission? Lattice cryptography expert Léo Ducas joins Nadim from CWI, Amsterdam to discuss this topic and more on Cryptography FM.
March 14th, 2021 | 47 mins
Zero-Knowledge proofs have broadened the realm of use cases for applied cryptography over the past decade, from privacy-enhanced cryptocurrencies to applications in voting, finance, protecting medical data and more. In 2018, Dr. Eli Ben-Sasson and his team introduced ZK-STARKs, a new zero-knowledge construction that functions without trusted setup, thereby broadening what zero-knowledge systems are capable of. We’ll talk about ZK-STARKs and more with Eli in this episode of Cryptography FM.
January 7th, 2021 | 1 hr 37 mins
real world crypto
In this special episode, Nadim and Benjamin go through the entire program of IACR Real World Crypto 2021 in preparation for an exciting conference!
December 8th, 2020 | 38 mins 8 secs
post-quantum cryptography, signature schemes
Serious weaknesses are uncovered in one of NIST's post-quantum cryptography finalists. Ward Beullens joins us to talk about his new research and more.
December 1st, 2020 | 46 mins 34 secs
Ange Albertini and Stefan Kölbl discuss how new research from Google, the University of Haifa and Amazon is exploiting authenticated encryption to make a PDF decrypt into... a different PDF. And much more.
November 20th, 2020 | 41 mins 41 secs
Sofía Celi of Cloudflare talks about the latest version of Off-the-Record secure messaging protocol, why deniability is important, and more.
November 17th, 2020 | 42 mins 29 secs
elliptic curve cryptography, side channel attacks
LadderLeak is a new attack that exploits side channels present in ECDSA, claiming to allow real-world breaking of ECDSA with less than a bit of nonce leakage. But what does “less than a bit” mean in this context? Is LadderLeak really that effective at breaking ECDSA, with so little information to go on? Joining us this episode are LadderLeak co-authors Akira Takahashi, Mehdi Tibouchi and Yuval Yarom to discuss these questions and more.
November 10th, 2020 | 45 mins 10 secs
Raphael Robert from Wire talks about how MLS wants to scale secure messaging to groups with hundreds or even thousands of participants.
November 3rd, 2020 | 41 mins 26 secs
Dr. David Archer of Galois discusses using zero-knowledge proof in order to prove the existence (or lack of) a software vulnerability without sharing details about the vulnerability itself.
October 27th, 2020 | 48 mins 34 secs
Luca Deo Feo and Hart Montgomery try to explain isogeny-based cryptography to Nadim.
October 20th, 2020 | 43 mins 56 secs
Formal verification has been used to prove the security of cryptographic protocols like Signal and TLS – but can it also be used to verify the correctness of legislation? Denis Merigoux tells us about how Catala wants to use formal methods to verify the French tax code.
October 13th, 2020 | 45 mins 36 secs
Jack O'Connor and Jean-Philippe Aumasson discuss how Merkle Trees make the new BLAKE3 hash function special, and talk about the design process for the BLAKE family of hash functions in general.