BEGIN:VCALENDAR
VERSION:2.0
PRODID:icalendar-ruby
CALSCALE:GREGORIAN
METHOD:PUBLISH
BEGIN:VTIMEZONE
TZID:Europe/Vienna
BEGIN:DAYLIGHT
DTSTART:20180325T030000
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20171029T020000
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20260406T013304Z
UID:5a44be5f0e34f895305843@ist.ac.at
DTSTART:20180123T090000
DTEND:20180123T100000
DESCRIPTION:Speaker: Maria E. Oswald\nhosted by Krzysztof Pietrzak\nAbstrac
 t: Cryptography refers to a set of mathematical techniques that can be use
 d to construct algorithms for privacy\, integrity\, authenticity\, etc. It
  therefore enables security in many aspects of our online lives. Over the 
 decades\, cryptography matured into a rigorous discipline\, by mathematica
 lly proving security based on clearly formalised adversarial models\, stro
 ngly inspired by advances in theoretical computer science.In the late 1990
 s a new threat model emerged that fundamentally challenged our understandi
 ng of what suitable adversarial models look like: the emergence of highly 
 practical side channel and fault attacks led to novel adversarial models\,
  and a flurry of papers aiming to solve implementation challenges associat
 ed with practical leakage resilience. Despite these academic advances\, ma
 ny real-world implementations of cryptography are still vulnerable to stan
 dard side channel attacks. There are several reasons for this: some advers
 arial models are too strong and therefore constructions too inefficient fo
 r practical use\, other models are too weak and therefore constructions no
 t useful\, but most importantly\, many constructions are very difficult to
  implement securely (leading to a catch-22). Thus\, despite all academic a
 dvances\, implementing cryptography securely is still difficult even for e
 xpert developers.Even worse\, with the rapid deployment of embedded device
 s (as part of sensor networks\, smart home devices\, etc.) many non-expert
  developers are required to implement or integrate cryptography securely i
 n software (or hardware). To make informed choices regarding the implement
 ation options for (a given set of) cryptographic algorithms\, one needs to
  understand the multitude of attack techniques\, the (sometimes) implicit 
 assumptions made for certain constructions\, and the access to some facili
 ty to conduct leakage attacks. This poses a new interesting avenue for res
 earch: how can we support (non-)expert developers in developing secure cry
 ptographic implementations? In this talk I will address several aspects re
 lated to this research challenge\, thereby implicitly providing a walk-thr
 ough some of the advances in side channel research.
LOCATION:Mondi Seminar Room 3\, Central Building\, ISTA
ORGANIZER:pdelreal@ist.ac.at
SUMMARY:Maria E. Oswald: Securing Cryptography
URL:https://talks-calendar.ista.ac.at/events/1030
END:VEVENT
END:VCALENDAR
