Seminars

Monash Cybersecurity Seminars

Be the first to know about cybersecurity innovations. Gain rare insights from world-leading experts. Free to attend, the Monash Cybersecurity Seminars are your portal to the latest and greatest in the discipline – from quantum-safe cryptography to blockchain.

If you would like to get involved in more Faculty of IT events,
discover what's on now.


Some of our speakers

Missed out? Catch up on our seminars online now.

13 Sep
Cybersecurity Seminars
11 am – 12 pm
Understanding the Science of Deception and Disinformation

As the bandwidth of digital media has grown exponentially over the last two decades, deception and its use in disinformation...

12 Aug
Cybersecurity Seminars
3 pm – 4 pm
Post-Quantum Signature from Isomorphism Problems of Trilinear Forms

In this talk, the speaker will present a new proposal on post-quantum signature from alternating trilinear form equivalence problem. The...

25 Jul
Cybersecurity Seminars
5 pm – 6 pm
Lattice-Based Zero-Knowledge Proofs and Applications: Shorter, Simpler, and More General

We present a much-improved practical protocol, based on the hardness of Module-SIS and Module-LWE problems, for proving knowledge of a...

14 Jul
Cybersecurity Seminars
5 pm – 6 pm
ROAST: Robust Asynchronous Schnorr Threshold Signatures

Bitcoin and other cryptocurrencies have recently introduced support for Schnorr signatures whose cleaner algebraic structure, as compared to ECDSA, allows...

06 Jul
Cybersecurity Seminars
10 am – 11 am
Enabling Deep Learning in a Resource-Limited Environment with Data Privacy and Software Security

In today’s data-driven world, deep learning (DL) has been widely used in various applications, including precision health/medicine, computer vision, and...

20 Jun
Cybersecurity Seminars
12 pm – 1 pm
Dumbo Protocol Family: Making Asynchronous Consensus Real

Asynchronous consensus is the most robust consensus protocol, thus critical for blockchains deployed over the open Internet. Unfortunately, all previous...

20 Jun
Cybersecurity Seminars
11 am – 12 pm
Cybersecurity in the Age of AI: From Social Networking to Internet of Things

Artificial Intelligence might contain a treasure trove of publicly-available data which can lead to deep intrusions into our lives. In...

11 May
Cybersecurity Seminars
4 pm – 5 pm
Blockchain Security by Incentives

The security of blockchain protocols critically relies on incentive compatibility. This talk will review the basic principles of game-theoretical analysis...

28 Apr
Cybersecurity Seminars
10 am – 11 am
Analysis of the Ideal-SIVP to Ring-DLWE Security Reduction

This talk, which will describe several deficiencies from a practice-oriented viewpoint in the approximate ideal-SIVP to ring-DLWE reduction, is based...

14 Apr
Cybersecurity Seminars
12 pm – 1 pm
Information Dispersal with Provable Retrievability for Rollups

The ability to verifiably retrieve transaction or state data stored off-chain is crucial to blockchain scaling techniques such as rollups...

07 Apr
Cybersecurity Seminars
2 pm – 3 pm
BAT: Small and Fast KEM over NTRU Lattices

In this talk, the speaker will introduce a new lattice KEM, called BAT. BAT has the smallest communication size, i.e....

24 Mar
Cybersecurity Seminars
2 pm – 3 pm
Zero-Knowledge Proofs of Isogeny

The talk will give an overview of zero-knowledge proofs, isogeny cryptography, and the problem of proving an isogeny. The speaker...

16 Mar
Cybersecurity Seminars
2 pm – 3 pm
Moving Target Defence (MTD): Recent Advances and Challenges

This talk will cover the following topics: 1) Introduction to Moving Target Defences (MTD) including brief intro to security fundamentals,...

24 Feb
Cybersecurity Seminars
12 pm – 1 pm
Beating Classical Impossibility of Position Verification

In this work, we initiate the study of position verification protocols with classical verifiers. Position verification is the central task...

10 Feb
Cybersecurity Seminars
2 pm – 3 pm
Speeding Dumbo: Making Asynchronous (Permissioned) Consensus Even Faster

Asynchronous BFT consensus protocols can enable a set of honest parties to reach agreement on an ever-growing linearized log of...

17 Nov
Cybersecurity Seminars
12 pm – 1 pm
New Applications of Zero-Knowledge Proofs

Zero-knowledge proofs have recently seen significant deployment and interest in the blockchain space. However, many of the tools motivated by...

11 Nov
Cybersecurity Seminars
11 am – 12 pm
Structured Encryption and Dynamic Leakage Suppression

Structured encryption (STE) schemes encrypt data structures in such a way that they can be privately queried. Special cases of...

28 Oct
Cybersecurity Seminars
12 pm – 1 pm
Right To Ask

The Right To Ask project will use cryptographic techniques from end-to-end verifiable e-voting for a much simpler problem: voting on...

07 Oct
Cybersecurity Seminars
11 am – 12 pm
Efficient and Affordable Zero-Knowledge Proofs: ResNet Inference and RAM Computation

Zero-knowledge (ZK) proofs with an optimal memory footprint have attracted a lot of attention because such protocols can easily prove...

22 Sep
Cybersecurity Seminars
4 pm – 5 pm
Making Secure Blockchains Scale

As blockchain has found applications to track ownership of digital assets, it is crucial for companies to adopt more secure...

16 Sep
Cybersecurity Seminars
12 pm – 1 pm
Post-Quantum Designated-Verifier zkSNARKs from Lattices

Zero-knowledge succinct non-interactive arguments of knowledge (zkSNARKs) enable efficient privacy-preserving proofs of membership for general NP languages. These are important...

09 Sep
Cybersecurity Seminars
3 pm – 4 pm
Zero-Knowledge Proofs for Large Circuits

While succinct zero-knowledge protocols have long been in the spotlight of researchers due to Blockchain applications, this talk will give...

26 Aug
Cybersecurity Seminars
11 am – 12 pm
Provable Security for Deterministic Wallets

Deterministic Wallets are an important tool for storing keys in cryptocurrencies such as Bitcoin or Ethereum. This talk will give...

12 Aug
Cybersecurity Seminars
3 pm – 4 pm
Does Fiat-Shamir Require a Cryptographic Hash Function?

The Fiat-Shamir transform is a general method for reducing interaction in public-coin protocols by replacing the random verifier messages with...

05 Aug
Cybersecurity Seminars
3 pm – 4 pm
MPC meets ML: Privacy-Preserving Machine Learning

This talk is on privacy-preserving machine learning using Multi-Party Computation (MPC) techniques. The primary work that the talk will rely...

22 Jul
Cybersecurity Seminars
5 pm – 6 pm
Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

In this talk, the speaker will talk about sets of ring elements such that the differences between the members are...

12 Jul
Cybersecurity Seminars
3 pm – 4 pm
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs

Many of the recent advanced lattice-based Sigma-/public-coin honest verifier (HVZK) interactive protocols based on the techniques developed by Lyubashevsky (Asiacrypt'09,...

21 Jun
Cybersecurity Seminars
3 pm – 4 pm
Privacy-Preserving Machine Learning

Machine learning is now used extensively in many application domains such as pattern recognition, medical diagnosis and credit-risk assessment. Applications...

17 Jun
Cybersecurity Seminars
11 am – 12 pm
Zero Knowledge Proofs and Their Applications to Machine Learning

Machine learning has become increasingly prominent and is widely used in various applications in practice. Despite its great success, the...

10 Jun
Cybersecurity Seminars
5 pm – 6 pm
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments

This talk is about a new approach of constructing range proofs. It is modular, and leads to highly competitive range...

27 May
Cybersecurity Seminars
11 am – 12 pm
Many-out-of-Many Proofs and Applications to Anonymous Zether

This talk describes a new zero-knowledge proof protocol called "many-out-of-many proofs", which generalizes the classic "one-out-of-many proofs" of Groth and...

20 May
Cybersecurity Seminars
3 pm – 4 pm
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset

Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrial-ready, practical solutions at...

06 May
Cybersecurity Seminars
3 pm – 4 pm
FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin

Most payment channels work based on this idea that once a dishonest channel party records an old state on-chain, its...

26 Apr
Cybersecurity Seminars
5 pm – 6 pm
Code-based Cryptography with Restricted Errors

The general Syndrome Decoding Problem (SDP) is the main foundation of code-based cryptography. We introduce a variant of the SDP,...

15 Apr
Cybersecurity Seminars
12 pm – 1 pm
TARDIS: A Foundation of Time-Lock Puzzles in UC

Time-based primitives like time-lock puzzles (TLP) are finding widespread use in practical protocols, partially due to the surge of interest...

08 Apr
Cybersecurity Seminars
3 pm – 4 pm
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy

In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that previous search queries cannot be associated with future updates, while...

29 Mar
Cybersecurity Seminars
3 pm – 4 pm
Optimal Broadcast Encryption from Pairings and LWE

Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a solution to the long-standing problem of public-key broadcast...

18 Mar
Cybersecurity Seminars
9 pm – 10 pm
MuSig2: Simple Two-Round Schnorr Multi-Signatures

Multi-signatures enable a group of signers to produce a single signature on a given message. Recently, Drijvers et al. (S&P'19)...

11 Mar
Cybersecurity Seminars
12 pm – 1 pm
Forward and Backward Private Conjunctive Searchable Symmetric Encryption

Dynamic searchable symmetric encryption (SSE) supports updates and keyword searches in tandem on outsourced symmetrically encrypted data, while aiming to...

04 Mar
Cybersecurity Seminars
2 pm – 3 pm
OblivSketch: Oblivious Network Measurement as a Cloud Service

Network function virtualisation enables versatile network functions as cloud services with reduced cost. Specifically, network measurement tasks such as heavy-hitter...

18 Feb
Cybersecurity Seminars
12 pm – 1 pm
KVaC: Key-Value Commitments for Blockchains and Beyond

As blockchains grow in size, validating new transactions becomes more and more resource intensive. To deal with this, there is...

11 Feb
Cybersecurity Seminars
7 pm – 8 pm
Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular

Zero-Knowledge Proofs for Set Membership are primitives that allow one to prove that is a member of a set without...

18 Jan
Cybersecurity Seminars
7 pm – 8 pm
Obfuscation from Circular Security

We describe a new approach to indistinguishability obfuscation, which yields candidate schemes that are secure under assumptions having a "circular...

17 Dec
Cybersecurity Seminars
7 pm – 8 pm
Verifiable Timed Signatures Made Practical

A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for a given amount...

04 Dec
Cybersecurity Seminars
10 am – 11 am
Private Computing on Public Blockchains

Public blockchains have emerged over the last decade as a promising architecture for distributed computing, touted by some as "the...

17 Nov
Cybersecurity Seminars
2 pm – 3 pm
Legion: Best-First Concolic Execution

Concolic execution and fuzzing are two complementary coverage-based testing techniques. How to achieve the best of both remains an open...

10 Nov
Cybersecurity Seminars
12 pm – 1 pm
The evolution of Ouroboros: A proof-of-stake implementation of Nakamoto’s vision

The release and wide adoption of Bitcoin has demonstrated how Byzantine consensus can be performed on a global scale. However,...

27 Oct
Cybersecurity Seminars
6 pm – 7 pm
Virtual ASICs: Generalized PoS-Mining

In proof-of-work based cryptocurrencies, miners invest computing power to maintain a distributed ledger. The drawback of such a consensus protocol...

20 Oct
Cybersecurity Seminars
7 pm – 8 pm
Lattice-Based Distributed Signature

Most recent works on distributed signatures have focused on ECDSA and over variants of Schnorr signatures. However, little attention has...

18 Sep
Cybersecurity Seminars
9 am – 10 am
Encrypted Blockchain Databases

Blockchain databases are storage systems that combine properties of blockchains and databases like decentralization, tamper-proofness, low query latency and support...

08 Sep
Cybersecurity Seminars
5 pm – 6 pm
Verifiable Delay Functions

A verifiable delay function (VDF) is a function whose evaluation requires running a given number of sequential steps, yet the...

13 Aug
Cybersecurity Seminars
10 am – 11 am
MMSAT: Lattice-Based Aggregate Signatures

Post-Quantum (PQ) signature schemes are known for large key and signature sizes, which may inhibit their deployment in real world...

22 Jul
Cybersecurity Seminars
6 pm – 7 pm
Randomness Beacons

Randomness beacons are decentralized protocols that provide a sequence of random outputs in such a way that it is possible...

02 Jun
Cybersecurity Seminars
4 pm – 5 pm
DEEP FRI Protocol

Interactive Oracle Proofs of Proximity (IOPP) is shown to be a suitable model for efficient and scalable zero-knowledge argument systems....