Advertisement · 728 × 90

Posts by COSIC

Preview
Oogscan als login? Sam Altman krijgt met omstreden technologie steeds meer grote bedrijven mee, tot ongerustheid van experts Je iris laten scannen om op het internet te bewijzen dat je een mens bent? OpenAI-topman Sam Altman vindt het al langer de logica zelf. Nu hij bedrijven als Tinder en Zoom aan boord heeft, wordt zijn ...

Iris scans to prove you’re human? Sam Altman’s World ID is going mainstream (Tinder, Zoom). Bart Preneel says the crypto is state‑of‑the‑art, but warns that centralization means serious #privacy risks if data is misused, hacked, or leaked.
www.demorgen.be/tech-wetensc... (paywall)

1 day ago 2 1 0 0
Post image

The #quantum era is coming. Is your #crypto ready? Join us in Rome on Sat May 9, for the Eurocrypt 2026–affiliated #PQCSA workshop on Post‑Quantum Cryptographic Protocols.
www.esat.kuleuven.be/cosic/events...
#postquantum

1 day ago 0 0 0 0
Programme | DATE 2026

And lastly Songqiao Cui is presenting "Extending and accelerating inner product masking with fault detection via instruction set extension".
More info on: www.date-conference.com/programme
#date2026 #date

1 day ago 0 0 0 0

3 COSIC papers at DATE 2026 in Verona this week!
Quinten Norga will present "ML-DSA-OSH: An efficient, open-source hardware implementation of ML-DSA".
Benedikt Gierlichs is giving a talk on "A graph-theoretic framework for randomness optimization in first-order masked circuits".

1 day ago 0 0 1 0

The EU’s age‑verification app is presented as a tool to protect minors. In Knack, Bart Preneel warns it will apply to everyone: social media in Europe may only work for users who install the app - raising effectiveness and #privacy concerns.
www.knack.be/nieuws/techn...

4 days ago 2 0 0 1
Preview
Europa heeft een app klaar waarmee jongeren kunnen bewijzen dat ze oud genoeg zijn voor sociale media: hoe werkt het? Té jonge kinderen op sociale media? Straks hebben Meta, Tiktok en co. “geen excuses” meer, maakt EU-commissievoorzitter Ursula von der Leyen zich sterk. Want de EU heeft een “privacyvriendelijke” app klaar, waarmee gebruikers hun leeftijd kunnen bewijzen. Hoe werkt die juist?

Gazet van Antwerpen reports that the EU’s new age‑verification app aims to keep minors off social media while preserving #privacy. But Bart Preneel notes similar bans led to VPN spikes: "You can simply choose a country without age limits."
www.gva.be/economie/tec... (paywall)

4 days ago 0 2 0 0
Preview
Europa heeft een app klaar waarmee jongeren kunnen bewijzen dat ze oud genoeg zijn voor sociale media: hoe werkt het? Té jonge kinderen op sociale media? Straks hebben Meta, Tiktok en co. “geen excuses” meer, maakt EU-commissievoorzitter Ursula von der Leyen zich sterk. Want de EU heeft een “privacyvriendelijke” app klaar, waarmee gebruikers hun leeftijd kunnen bewijzen. Hoe werkt die juist?

Het Nieuwsblad reports that the EU’s new age‑verification app aims to keep minors off social media while preserving #privacy. But Bart Preneel notes similar bans led to VPN spikes: "You can simply choose a country without age limits."
www.nieuwsblad.be/binnenland/e... (paywall)

4 days ago 0 0 0 0
COSIC Seminar "Extending and Accelerating Inner Product Masking with Fault..." (Songqiao Cui, COSIC)
COSIC Seminar "Extending and Accelerating Inner Product Masking with Fault..." (Songqiao Cui, COSIC) YouTube video by COSIC - Computer Security and Industrial Cryptography

📹The COSIC Seminar on "Extending and Accelerating Inner Product Masking with Fault Detection via Instruction Set Extension" by Songqiao Cui (COSIC) is now available on our YouTube channel: www.youtube.com/watch?v=qq9Z...

5 days ago 0 0 0 0
Advertisement
Preview
« Chat Control » 2.0 : La Commission européenne s’entête à vouloir espionner nos téléphones | Le Canard enchaîné A peine Bruxelles a-t-elle stoppé le scan automatique des photos privées que les Gafam remettent aussitôt une pièce dans la machine. Sous prétexte de lutter……

#PhotoDNA is promoted as a reliable tool for detecting illegal images, but KU Leuven research shows major flaws: large‑scale false positives and easy evasion. Automated mass scanning risks harming privacy without stopping abuse.
www.lecanardenchaine.fr/technologie-... (paywall)

5 days ago 0 0 0 0
VRT MAX

[3/3] Listen to the interview (in Dutch) here: www.vrt.be/vrtmax/luist...

5 days ago 2 0 0 0

[2/3] Bart Preneel on Radio 1: Comparing online age checks to showing ID in a shop misses a key point: offline, obvious adults aren’t checked. Online, everyone must prove they’re 16+. VPNs and shared phones make this easy to bypass. This is symbolic policy, not protection.

5 days ago 1 1 1 0

[1/3] Von der Leyen says EU age checking app is ready: "This app will allow users to prove their age when accessing online platforms, just as shops ask for proof of age from someone buying alcoholic drinks in a shop."

5 days ago 2 1 1 0
Preview
“Als het klopt, hebben we een gigantisch probleem”: onrust over superkrachtig AI-systeem Mythos neemt toe Mythos, het AI-systeem van Anthropic, leidt tot hoogspanning in cyberspace. Nu beginnen ook politici en overheidsdiensten zich te roeren.

🚨 Growing concern over #Mythos, #Anthropic’s #AI that claims to uncover software vulnerabilities at scale without independent verification.
Bart Preneel: "If this is a real breakthrough, we are facing a gigantic problem."
www.standaard.be/media-en-cul... (paywall)

5 days ago 0 0 0 0
WhisperPair: Hijacking Bluetooth Accessories Using Google Fast Pair WhisperPair is a family of practical attacks leveraging a flaw in the Google Fast Pair implementation on flagship audio accessories.

The final paper, FAQs, guidance for users, and our testing harness and code are all 𝗮𝘃𝗮𝗶𝗹𝗮𝗯𝗹𝗲 𝗼𝗻 𝗼𝘂𝗿 𝘄𝗲𝗯𝘀𝗶𝘁𝗲: whisperpair.eu

1 week ago 0 0 0 0

We uncovered security & #privacy flaws in Google Fast Pair, showing that vulnerable accessories can be hijacked without consent - to inject audio, activate microphones, or enable tracking - affecting hundreds of millions of devices and exposing risks of convenience‑first design.

1 week ago 0 0 1 0
Post image

Our work on 𝗪𝗵𝗶𝘀𝗽𝗲𝗿𝗣𝗮𝗶𝗿 (breaking Google Fast Pair) has been accepted at both the IEEE Symposium on Security and Privacy (S&P) 2026 and Black Hat Asia 2026.
#google #fastpair #bluetooth

1 week ago 2 1 1 0
Post image

Attending #eurocrypt in Rome this year? Consider joining the #PQCSA workshop on Post-Quantum Cryptographic Protocols on Saturday 9 May 2026: www.esat.kuleuven.be/cosic/events...
#postquantum #quantum

1 week ago 0 0 0 0
Preview
Is het grootste cryptomysterie ooit opgelost? Anarchistische computerwetenschapper zou de bedenker van bitcoin zijn Is de identiteit van Satoshi Nakamoto, de geestelijke vader van bitcoin, onthuld? Volgens ‘The New York Times’ wel. Het zou gaan om Adam Back, een Britse computerwetenschapper. Hij ontkent, maar met goede reden wellicht.

NYT suggests Adam Back could be Satoshi Nakamoto. He denies it. In GVA, Bart Preneel notes the clues are strong but not a smoking gun, and says being #Satoshi is no gift, turning someone into a high‑risk billionaire target. #bitcoin
www.gva.be/binnenland/i... (paywall)

1 week ago 0 0 0 0
Advertisement
Preview
Is het grootste cryptomysterie ooit opgelost? Anarchistische computerwetenschapper zou de bedenker van bitcoin zijn Is de identiteit van Satoshi Nakamoto, de geestelijke vader van bitcoin, onthuld? Volgens ‘The New York Times’ wel. Het zou gaan om Adam Back, een Britse computerwetenschapper. Hij ontkent, maar met goede reden wellicht.

NYT suggests Adam Back could be Satoshi Nakamoto. He denies it. In Nieuwsblad, Bart Preneel notes the clues are strong but not a smoking gun, and says being #Satoshi is no gift, turning someone into a high‑risk billionaire target. #bitcoin
www.nieuwsblad.be/binnenland/i... (paywall)

1 week ago 0 0 0 0
COSIC Seminar "Identity-Privacy Paradox: How to Identify Friend or Foe...?" ( Ema Šujster, TU Delft)
COSIC Seminar "Identity-Privacy Paradox: How to Identify Friend or Foe...?" ( Ema Šujster, TU Delft) YouTube video by COSIC - Computer Security and Industrial Cryptography

🎥The COSIC Seminar "Identity-Privacy Paradox: How to Identify Friend or Foe Without Self Disclosure?" by Ema Šujster (TU Delft) is now available on our YouTube channel: www.youtube.com/watch?v=7cTO...

1 week ago 0 0 0 0
Post image Post image

Welcome to Yevhen Perehuda, who is visiting Vincent Rijmen's team: "I chose COSIC because of its excellent reputation in cryptography and security research. I see this stay as a great opportunity to learn, improve my skills, and work in an inspiring academic environment."
#choosecosic

1 week ago 1 0 0 0
Post image Post image

Welcome to Dongwon Lee, who is visiting Frederik Vercauteren's team at COSIC.
"I chose to join COSIC because it is a world-leading research group in cryptography with a strong reputation for innovative work."
#choosecosic

1 week ago 1 0 0 0
VRT MAX

Who is behind the invention of #Bitcoin in 2008? "It’s possible they’ve now found the solution, but it remains speculation." Bart Preneel on Radio 1: www.vrt.be/vrtmax/luist...

1 week ago 0 0 0 0

Is a social media ban for under‑13s a good idea? "It’s very intrusive and largely ineffective. People will bypass controls. Focusing on age limits distracts from the real issue: social media can be toxic and addictive." (Bart Preneel in Knack)
www.knack.be/nieuws/belgi...

1 week ago 0 0 0 0

Congratulations to Betul Aşkın Özdemir for successfully defending her PhD thesis on "Multidimensional Linear Cryptanalysis of Block Cipher Structures" today! 🎓🎉

1 week ago 2 0 0 0
Advertisement
Post image

You can now view the final program and register for the #PQCSA workshop on Post-Quantum Cryptographic Protocols in Rome, Italy
on 9 May 2026 (Eurocrypt 2026 affiliated event) via: www.esat.kuleuven.be/cosic/events...
#postquantum #quantum #Eurocrypt

1 week ago 0 0 0 0
Post image

New blog post on the COSIC website: "What’s Privacy Actually Good For? Measuring It Through the Harms It Prevents" by Sri Harsha Gajavalli: www.esat.kuleuven.be/cosic/blog/w...

1 week ago 0 0 0 0
Preview
Emmanuel Grégoire dévoile son En pleine tempête dans les écoles de la capitale, où les révélations d'agressions sexuelles se multiplient, le nouveau maire socialiste de Paris Emmanuel Grégoire était attendu au tournant par les col...

🎙️ Chat control on national radio:
COSIC researcher Diane Leblanc‑Albarel discusses #ChatControl on France Culture’s news.
▶️ Replay (from 7:58): www.radiofrance.fr/francecultur...
🔗 www.pseudodna.eu
#chatcontrol #photodna #pseudodna

1 week ago 2 2 0 0
Post image Post image

Pierre Pébereau just joined COSIC as a postdoc in Fre Vercauteren's team: "I chose COSIC to work with excellent researchers on the analysis of post-quantum signature algorithms."
#choosecosic

2 weeks ago 3 1 0 0
Abstract. Privacy-preserving machine learning (PPML) has become increasingly important due to the need to protect sensitive data during training and inference. Secure multiparty computation (MPC) and homomorphic encryption (HE) have emerged as foundational technologies, enabling secure computation over private data. In this work, we provide a systematic comparative overview of MPC frameworks for PPML, focusing on protocols that introduce novel approaches rather than incremental improvements. Frameworks are analyzed based on computational and communication complexity, throughput, security guarantees, and applicability in small-party settings. Each underlying primitive in PPML is examined from an MPC perspective, highlighting its role and trade-offs. We also emphasize the diversity of secret-sharing schemes and associated interoperability challenges, proposing scheme conversions to facilitate efficient hybrid solutions. This Systematization of Knowledge guides researchers in identifying open problems and practitioners in selecting effective MPC-based frameworks for real-world PPML deployment.

Abstract. Privacy-preserving machine learning (PPML) has become increasingly important due to the need to protect sensitive data during training and inference. Secure multiparty computation (MPC) and homomorphic encryption (HE) have emerged as foundational technologies, enabling secure computation over private data. In this work, we provide a systematic comparative overview of MPC frameworks for PPML, focusing on protocols that introduce novel approaches rather than incremental improvements. Frameworks are analyzed based on computational and communication complexity, throughput, security guarantees, and applicability in small-party settings. Each underlying primitive in PPML is examined from an MPC perspective, highlighting its role and trade-offs. We also emphasize the diversity of secret-sharing schemes and associated interoperability challenges, proposing scheme conversions to facilitate efficient hybrid solutions. This Systematization of Knowledge guides researchers in identifying open problems and practitioners in selecting effective MPC-based frameworks for real-world PPML deployment.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

SoK: Connecting the Dots in Privacy-Preserving ML - Systematization of MPC Protocols and Conversions Between Secret Sharing Schemes (Martin Zbudila, Ajith Suresh, Hossein Yalame, Omid Mirzamohammadi, Aysajan Abidin, Bart Preneel) ia.cr/2025/1679

7 months ago 2 2 0 0