Our regular Crypto Café seminars take place every other Tuesday,10 am-10:50 am during the semester. We invite local and international experts on topics in Mathematics and Computer Science related to Cryptography and Information Security.
Come and join us for freshly brewed coffee and interesting conversations on the most exciting topics in cryptography.
Where: SE-43 (Charles E. Schmidt College of Science) - Room 215
https://researchseminars.org/seminar/CryptoCafe
You can catch up on any missed meetings by following the below link:
Fall, 2025, Crypto Cafe Schedule:
October 14, 2025, 10:00 am Science Building (SE-43), room 215
Speaker: Anil Kumar Pradhan, Founding Cryptographer and Cryptography Research Lead, Vaultree FLYER
Title: Beyond Theory: Industry Challenges in Adopting Homomorphic Encryption
Abstract: Fully Homomorphic Encryption (FHE) promises quantum-resilient, privacy-preserving computation for sensitive data across industries. However, despite academic breakthroughs, the leap from laboratory models to enterprise-scale adoption remains daunting. Industry faces formidable obstacles, including computational resource demands, implementation complexity, slow processing speeds, and high costs, aggravated by a shortage of FHE talent and lack of standardized practices. Integrating FHE into legacy and cloud systems requires extensive technical overhaul, often with questionable ROI. The disconnect between academic solutions and practical business needs, especially regarding scalability, cost, and integration continues to deter widespread implementation. Emerging technologies and optimization strategies, such as hardware acceleration and real-world application benchmarking, may help bridge the gap, but genuine adoption will require collaborative efforts and a shift in focus from theoretical promise to operational feasibility. Bio
Anil Kumar Pradhan is a cryptographer specializing in practical privacy-enhancing technologies and their deployment in real-world systems. At Vaultree, he works at the intersection of advanced cryptography and industry adoption, focusing on fully homomorphic encryption (FHE), encrypted machine learning, and secure computation at scale. With a background spanning both academic research and enterprise engineering, he bridges the gap between theoretical innovation and operational feasibility. Anil has contributed to projects that bring cutting-edge cryptographic methods into production environments, with particular attention to performance optimization, compliance, and developer experience. He is passionate about making strong cryptography usable, scalable, and impactful across industries that handle sensitive data.
Anil Kumar Pradhan is the Founding Cryptographer and Cryptography Research Lead at Vaultree Ireland, and has over a decade of experience in applied cryptography. He holds an M.Sc. in Mathematics from the Indian Institute of Technology, Delhi, and a B.Sc. (Hons) in Mathematics and Computing from the Institute of Mathematics and Applications, Bhubaneswar.
https://researchseminars.org/seminar/CryptoCafe
October 28, 2025, 10:00 am Science Building (SE-43), room 215
Speaker: Dr. Sohyun Jeon, Ewha Womans University
Title: LastRings: Lattice-based Scalable Threshold Ring Signatures FLYER
Abstract: This talk presents the first lattice-based threshold ring signature scheme with signature size scaling logarithmically in the size of the ring while supporting arbitrary thresholds. Our construction is also concretely efficient, achieving signature sizes of less than 150kB for ring sizes up to N=4096 (with threshold size T=N/2, say). This is substantially more compact than previous work.
Our approach is inspired by the recent work of Aardal et al. (CRYPTO 2024) on the compact aggregation of Falcon signatures, that uses the LaBRADOR lattice-based SNARKs to combine a collection of Falcon signatures into a single succinct argument of knowledge of those signatures. We proceed in a similar way to obtain compact threshold ring signatures from Falcon, but crucially require that the proof system be zero-knowledge in order to ensure the privacy of signers. Since LaBRADOR is not a zkSNARK, we associate it with a separate (non-succinct) lattice-based zero-knowledge proof system to achieve our desired properties.
Bio: Sohyun Jeon recently completed a PhD at Ewha Womans University in the Republic of Korea. Research interests are lattice-based cryptography. In particular, she is interested in zero-knowledge proofs and their applications
https://researchseminars.org/seminar/CryptoCafe
November 25, 2025, 10:00 am Science Building (SE-43), room 215
Speaker: Arindam Mukherjee, Assistant Professor in Mathematics at A.M. College, Jhalda, India. FLYER
Title: The Representation Technique for Small Max-Norm LWE
Abstract: The Representation Technique, originally introduced by Howgrave-Graham and Joux in the context of the Subset Sum problem, has since become a powerful tool in algorithmic cryptanalysis. It was later adapted for Information Set Decoding (ISD). Currently, the state-of-the-art algorithms to counter subset sum and syndrome decoding problems make use of the representation technique in some form. Recently, May (Crypto 2021) proposed a representation-based attack against small max-norm LWE. This work was later improved in Asiacrypt 2023 and JoC 2024 (https://eprint.iacr.org/2023/243).
In this talk, we will give an overview of the representation technique and its impact on the small max-norm LWE problem.
Bio: Arindam Mukherjee works in public-key cryptanalysis, with a focus on post-quantum hardness assumptions. He received his MSc and PhD in Mathematics from IIT Madras, Chennai, India. He is currently an Assistant Professor in Mathematics at A.M. College, Jhalda, India.
September 16, 2025, 10:00 am Science Building (SE-43), room 215
Speaker: Dung Bui, LIP6, Sorbonne Université, France
Title: FOLEAGE: F4OLE-Based Multi-Party Computation for Boolean Circuits FLYER
Abstract: Secure Multi-party Computation (MPC) allows two or more parties to compute any public function over their privately-held inputs, without revealing any information beyond the result of the computation. Modern protocols for MPC generate a large amount of input-independent preprocessing material called multiplication triples, in an offline phase. This preprocessing can later be used by the parties to efficiently instantiate an input-dependent online phase computing the function.
To date, the state-of-the-art secure multi-party computation protocols in the preprocessing model are tailored to secure computation of arithmetic circuits over large fields and require little communication in the preprocessing phase, typically O(N · m) to generate m triples among N parties. In contrast, when it comes to computing preprocessing for computations that are naturally represented as Boolean circuits, the state-of-the-art techniques have not evolved since the 1980s, and in particular, require every pair of parties to execute a large number of oblivious transfers before interacting to convert them to N-party triples, which induces an Ω(N^2 · m) communication overhead.
In this paper, we introduce FOLEAGE, which addresses this gap by introducing an efficient preprocessing protocol tailored to Boolean circuits. FOLEAGE exhibits excellent performance: It generates m multiplication triples over F2 using only N · m + O(N^2 · log m) bits of communication for N-parties, and can concretely produce over 12 million triples per second in the 2-party setting on one core of a commodity machine. Our result builds upon an efficient Pseudorandom Correlation Generator (PCG) for multiplication triples over the field F4. Roughly speaking, a PCG enables parties to stretch a short seed into a large number of pseudorandom correlations non-interactively, which greatly improves the efficiency of the offline phase in MPC protocols. Our construction significantly outperforms the state-of-the-art, which we demonstrate via a prototype implementation. This is achieved by introducing a number of protocol-level, algorithmic-level, and implementation-level optimizations on the recent PCG construction of Bombar et al. (Crypto 2023) from the Quasi-Abelian Syndrome Decoding assumption.
Bio: Dung Bui is a postdoctoral researcher at LIP6, Sorbonne Université, France. She completed her PhD at IRIF, Université Paris Cité. Her research interests are in various aspects of both practical and theoretical cryptography, including secure multiparty computation, zero-knowledge proofs, and post-quantum cryptography.
Contact email: dung.bui@lip6.fr