Originally invented as an art and science of secret writing, today, cryptography has evolved to much more than that. It is a deed of both makers and breakers and is used extensively by citizens, corporations, and in messaging applications, computer networks, and protocols. The real world cryptographers podcast captures the history of the field via stories.
In this episode with Vinod Vaikuntanathan, a Professor at MIT and a co-founder of Duality Technologies, we discuss fully-homomorphic encryption, the roadmap towards making it practical, lab culture at the MIT crypto group, and more.
An episode with two Belgian cryptographers, Vincent Rijmen and Joan Daemen, the inventors of the AES block cipher. Co-hosted with Tal Rabin.
In this episode with Yuval Ishai (Computer Science Professor at the Technion), we discuss the crypto community culture, teaching, multi-party computation, "how low can we go," and other topics.
Tal Rabin. A professor at the University of Pennsylvania . Former head of cryptography research group at IBM's Thomas J. Watson Research Center and Algorand Foundation. We discuss the history of the IBM crypto research group and its legacy in the field.
An episode with Ivan Damgard. Co-hosted with Tal Rabin. We discuss multi-party computation protocols, collaboration in pre-eprint era, the history of the field in Europe, and other topics.
In this episode, we host David Wong, a security engineer at Facebook. We discuss bugs in crypto protocols, the security of blockchain systems, formal verification, and the `Real World Cryptography` book he's writing.
In this episode we're hosting Seny Kamara, an Associate Professor of Computer Science at Brown University and Chief Scientist at Aroki Systems.We discuss academic vs. industry research in cryptography, searchable encryption, encrypted databases, and social problems in the field. References: - Seny's webpage: http://cs.brown.edu/~seny/- Keynote at CRYPTO 2020 on Crypto for the People: https://www.youtube.com/watch?v=Ygq9ci0GFhA- Practical Techniques for Searches on Encrypted Data: https://people.eecs.berkeley.edu/~dawnsong/papers/se.pdf- CryptDB: https://people.csail.mit.edu/nickolai/papers/raluca-cryptdb.pdf- Inference Attacks on Property-Preserving Encrypted Databases: https://cs.brown.edu/~seny/pubs/edb.pdf
In this episode, we discuss how Yael started working in the field, choosing foundational research problems, privacy-preserving tools such as ring-signatures used in cryptocurrencies (Monero) and recent breakthroughs in schemes that allow hiding secrets in program code. Did you know that ring-signatures came from the motivation to understand the Fiat-Shamir paradigms? Who will get the credit for the recent breakthroughs in program obfuscation? Did you know the history of the famous IP = PSPACE result? Listen to the podcast to learn the answers. Quotes from the show: “I won’t be happy with myself if my work is buried and not applied anywhere”, “The world brings problems to you”. Some referenced papers: * R. Gay and R. Pass. Indistinguishability Obfuscation from Circular Security, https://eprint.iacr.org/2020/1010.* A. Jain, H. Lin, and A. Sahai. Indistinguishability Obfuscation from Well-Founded Assumptions, https://eprint.iacr.org/2020/1003.* C. Lund, L. Fortnow, H.J. Karloff, and N. Nisan. Algebraic Methods for Interactive Proof Systems. * A. Shamir. IP = PSPACE.