You can find cryptography related all conference information in the below two link.
Fully Homomorphic Encryption (FHE) [wiki]
Starting Reading Papers:
- ON DATA BANKS AND PRIVACY HOMOMORPHISMS [OnDataBanks.pdf].
- Computing Arbitrary Functions of Encrypted Data [FHe-gentry.pdf].
- Fully Homomorphic Encryption over the Integers [FHEInt.pdf].
For more papers click here.
Video Link:
- https://youtu.be/xlcb_G1_rzk.
- https://youtu.be/iER9RkD05Oc.
- https://youtu.be/O8IvJAIvGJo.
- https://youtu.be/Hl5lMDydMvs.
For more details check in this link and link.
Multi-Party Computation (MPC) [wiki]
Must watch http://cyber.biu.ac.il/event/the-5th-biu-winter-school/.
For more details check in this link.
Before start reading paper on SS, must look into the wiki link. Go through the Shamir Secret Sharing scheme Example.
Starting Reading Papers:
- How to Share Secret [shamirturing.pdf].
- Safeguarding cryptographic keys [Safeguarding.pdf].
Verifiable Secret Sharing:
- A Practical Scheme for Non-interactive Verifiable Secret Sharing [feldmanVSS.pdf].
Start from the following paper: Intel SGX Explained [IntelSGX.pdf].
Must watch the following videos:
First check into the various type of attack on SGX in wiki.
Papers:
- A Systematic Evaluation of Transient Execution Attacks and Defenses [TransientEx-Atk.pdf].
- SGXPECTRE: Stealing Intel Secrets from SGX Enclaves via Speculative Execution [SGXPECTRE.pdf].
- Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution [Foreshadow.pdf].
Papers:
- Teechain: A Secure Payment Network with Asynchronous Blockchain Access [TEEchain.pdf].
- SafeKeeper: Protecting Web Passwords using Trusted Execution Environments [Safekeeper.pdf].
- Obscuro: A Bitcoin Mixer using Trusted Execution Environments [obscuro.pdf].
TEE/SGX has lots of application on MPC and Privacy-Preserving Machine Learning field, find it in the MPC and PPML section.
Good source for Intel SGX papers: https://github.com/vschiavoni/sgx-papers
Must watch before reading https://youtu.be/4zrU54VIK6k.
Papers:
- Oblivious Multi-Party Machine Learning on Trusted Processors [ObliviousMP-TEE.pdf].
- SLALOM: FAST, VERIFIABLE AND PRIVATE EXECUTION OF NEURAL NETWORKS IN TRUSTED HARDWARE [SLALOM.pdf].
- FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning [FLASH.pdf].
- SecureML: A System for Scalable Privacy-Preserving Machine Learning [SecureML].
- SecureNN: 3-Party Secure Computation for Neural Network Training [SecureNN].
- HybridAlpha: An Efficient Approach for Privacy-Preserving Federated Learning [HybridAlpha.pdf].
For more papers click here.
Good Resources:
Video Link:
Good Research Details: https://vdfresearch.org
Starting Reading Papers:
- Time lock puzzles and timed release Crypto [TLPCrypto.pdf].
- Time-Lapse Cryptography [TimeLapse-Crypto.pdf].
- Verifiable Delay Functions [VerDelayFun.pdf].
Video Link:
Post Quantum Cryptography [wiki]
Must watch the following videos:
- Introduction of Lattices by Oded Regev.
- The Mathematics of Lattices 1 by Vinod Vaikuntanathan.
- The Mathematics of Lattices 2 by Vinod Vaikuntanathan.
Course on Lattice Cryptography:
-
Advanced Topics in Cryptography by Vinod Vaikuntanathan. [Course Page] [Course Notes].
-
Lattices in Computer Science by Oded Regev [Course Page].
- FHE Scheme implementation (FHE over Integer [Paper]).
- Building a Dynamic Time Lock Puzzle.
- Writing a SoK (Review or Survey) paper on Intel SGX Attack.
- Building a Leakage Resilient Homomorphic Secret Sharing Scheme.
- Construct an efficient PPML scheme.