Cryptography

file

Visible to the public Cryptol version 2: An Open Source Cryptol

Abstract

HCSS participants, in the main, know about Galois' Cryptol language and system and its capabilities. In short, Cryptol is a domain-specific language for programming, executing, testing, and formally reasoning about streams of bits. Cryptol particularly excels at specifying and reasoning about cryptographic algorithms.

Galois has decided to "reboot" Cryptol and create, from the ground up, a new Open Source Cryptol release: Cryptol version 2.

forum

Visible to the public PhD Position in Information Security at Chalmers University of Technology

1 PhD position in Information Security at the Dept. of Computer Science and Engineering, Chalmers University of Technology, Sweden

Application deadline: August 31, 2013

Job Description

file

Visible to the public Techniques for Scalable Symbolic Simulation

Presented as part of the 2013 HCSS conference.

ABSTRACT

Symbolic simulation is a powerful technique for building mathematical models describing a program's results by simulating execution while interpreting inputs as symbolic variables. Such models can then be used to prove properties about the corresponding source program, including equivalence against a reference implementation.

file

Visible to the public Efficiently Searchable Symmetric Encryption

Large-scale data management systems rely more and more on cloud storage, where the need for efficient search capabilities clashes with the need for data privacy. Searchable encryption is a tool for supporting queries to en- crypted databases which provides various levels of efficiency, functionality, and security.

page

Visible to the public On the (Im)Possibility of Tamper-Resilient Cryptography

ABSTRACT

We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may tamper with each bit of the honest parties' random tape with probability p, but have to do so

in an "online" fashion. We present both positive and negative results: