Cryptography FM

Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.

https://www.cryptography.fm

Eine durchschnittliche Folge dieses Podcasts dauert 45m. Bisher sind 24 Folge(n) erschienen. Dieser Podcast erscheint alle 9 Tage.

Gesamtlänge aller Episoden: 18 hours 27 minutes

subscribe
share






  • 1
  • 2
  •    
  • 3
  • >

episode 24: Episode 24: CryptoHack's Collection of Cryptic Conundrums!


For several years, CryptoHack has been a free platform for learning modern cryptography through fun and challenging programming puzzles. From toy ciphers to post-quantum cryptography, CryptoHack has a wide-ranging and ever increasing library of puzzles for both the aspiring and accomplished cryptographer...


share








 February 27, 2023  49m
 
 

episode 23: Episode 23: Psychic Signatures in Java!


Nadim and Lucas talk to Neil Madden about his discovery of the "Psychic Signatures" vulnerability in Java, allowing attackers to completely bypass cryptographic signature checks in Java platforms in highly sensitive security contexts.


share








 January 25, 2023  53m
 
 

episode 22: Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!


Threema is a Swiss encrypted messaging application. It has more than 10 million users and more than 7000 on-premise customers. Prominent users of Threema include the Swiss Government and the Swiss Army, as well as the current Chancellor of Germany, Olaf Scholz. Threema has been widely advertised as a secure alternative to other messengers...


share








 January 16, 2023  52m
 
 

episode 21: Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!


Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.


share








 August 24, 2021  46m
 
 

episode 20: Episode 20: Cryptanalysis of GPRS: GEA-1 and GEA-2!


Were GPRS's encryption ciphers deliberately backdoored? Nadim discusses this question with cryptanalysts Gaëtan Leurent and Håvard Raddum.


share








 July 20, 2021  42m
 
 

episode 19: Episode 19: Cross-Protocol Attacks on TLS with ALPACA!


Nadim discusses a new line of cross-protocol attacks on TLS with Marcus Brinkmann and Robert Merget, made possible via the new ALPACA Attack, research published this year at the USENIX Security Symposium.


share








 July 12, 2021  41m
 
 

episode 18: Episode 18: Optimizing Cryptography for Microcontrollers!


Nadim talks with Peter Schwabe and Matthias Kannwischer about the considerations — both in terms of security and performance — when implementing cryptographic primitives for low-level and embedded platforms


share








 June 23, 2021  36m
 
 

episode 17: Episode 17: Breaking Wi-Fi With Frame Attacks!


Mathy Vanhoef breaks Wi-Fi security yet again, with a new frame aggregation attack that affects all Wi-Fi encryption standards since 1997 and up to today.


share








 June 1, 2021  35m
 
 

episode 16: Episode 16: Contact Discovery in Mobile Messengers!


Do we really need to rely on sharing every phone number on our phone in order for mobile messengers to be usable? What are the privacy risks, and do better cryptographic alternatives exist for managing that data? Joining us are researchers looking exactly into this problem, who will tell us more about their interesting results.


share








 May 24, 2021  46m
 
 

episode 15: Episode 15: Bringing Secure Multiparty Computation to the Real World!


Nadim talks with Yehuda Lindell and Nigel Smart of Unbound Security about how multi-party computation can enter the real world, away from the blank slate of academia.


share








 April 26, 2021  46m
 
 
  • 1
  • 2
  •    
  • 3
  • >