IMDEA initiative
Abstract: This study investigates the security landscape of space mission protocols, examining standards set by the Consultative C...
Abstract: The limited scripting capabilities in Bitcoin-like cryptocurrencies have forced implementations of smart contracts as mu...
Abstract: This talk will explore a general protocol for securely realizing atomic swaps across cryptocurrencies. In atomic swaps, ...
Abstract: Smart contracts are distributed applications on blockchains that implement advanced financial instruments, such as decen...
Abstract: Linear Temporal Logic (LTL) is one of the most common formalisms for expressing properties of systems in formal verifica...
Abstract: Non-Interactive Verifiable Secret Sharing (NI-VSS) is a technique for distributing a secret among a group of individuals...
Abstract: Polynomial programs are imperative programs with real-valued variables, i.e. imperative programs in which all expression...
Abstract: Knox is a new framework that enables developers to build hardware security modules (HSMs) with high assurance through fo...
Abstract: In this talk we demonstrate decidability for the intuitionistic modal logic S4 first formulated by Fischer Servi [1]. Th...
Abstract: Phishing is one of the most common forms of social engineering attacks and is regularly used by criminals to compromise ...
Abstract: Cryptographic voting protocols have recently seen much interest from practitioners due to their use in countries such as...
Abstract: In this talk, I will introduce and motivate a well-studied probabilistic variant of the classic inclusion problem betwee...
Abstract: Recently, in June, our group submitted a new proposal, namely FAEST, to the current NIST PQ signature (additional round)...
Abstract: Guillermo Errezil will talk about the work, goals and collaborations of Formal Vindication.
Abstract: Although in many occasions the protection of information systems is achieved by implementing obscure procedures, the pro...
Abstract: In this talk, we present a new framework, called polyhedral abstraction, for checking safety properties on Petri nets, t...
Abstract: Non-Interactive Zero-Knowledge proofs (NIZKs) allow a prover to convince a verifier about the validity of a claim withou...
Abstract: In this talk, we give a brief introduction to probabilistic programming and present Zar: a formally verified compiler pi...
Abstract: Many proofs of interactive cryptographic protocols (e.g., as in Universal Composability) operate by proving the protocol...
Abstract: The continuously increasing interest in intelligent autonomous systems underlines the need for new developments in cyber...
Abstract: Computer systems and software play a vital role in the functioning of our society. Ensuring their security is of utmost ...
Abstract: Autonomous Systems offer hope towards moving away from mechanized, unsafe, manual, often inefficient practices. Last dec...
Abstract: Secure Multiparty Computation (MPC) allows a set of mutually distrusting parties to jointly perform a computation on the...
Abstract: Open Access (OA) is a mechanism that allows for free and immediate access to research results and data. It aims to enhan...
Abstract: The most widely studied language for expressing statements in the context of Zero-Knowledge (ZK) proofs is arithmetic ci...
Abstract: Non-volatile main memory (NVMM) is a new tier in the memory hierarchy that offers jointly the durability of spinning dis...
Abstract: Self-adaptation is often defined as the ability of systems to alter at runtime their behaviour in response to changes in...
Abstract: The context-free language (CFL) reachability problem on graphs (as well as a closely related problem of language emptine...
Abstract: Smart contracts are immutable programs deployed on the blockchain that can manage significant assets. Because of this, v...