Talks and presentations

Target Collision Resistance: Security Requirements in the Context of Hash-based Signatures

March 16, 2025

Workshop, Workshop on Poseidon: Cryptanalysis of Algebraic Hash Functions, Italy, Rome

Ethereum is one of the largest blockchains in the world and it relies on a variety of different cryptographic primitives and protocols that directly affect both its security and efficiency. Improving these tools is not only of academic interest, but also impacts the security of millions of users.

NIST Workshop on Guidance for KEMs

February 26, 2025

Workshop, NIST Workshop on Guidance for KEMs, Online

A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a public-key encryption (PKE) scheme and then apply the Fujisaki–Okamoto (FO) transform that turns any weakly secure PKE scheme into an IND-CCA secure KEM using derandomization and a re-encapsulation check. This talk will discuss three advanced concepts that tackle certain limitations of FO when being used in practice: