Radboud Digital Security group Lunch Talk homepage

Welcome to the site of the talks organised by Radboud Digital Security group. We organize a talk every Wednesday at 12:30.

Objectives:

Policy:

Resources:

Upcoming talks

  • Wednesday, 25th of February 2026 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Rusidy Makarim

    Towards Tight Differential Bounds of Ascon: A Hybrid Usage of SMT and MILP

    The search for differential trails in symmetric-key primitives is increasingly performed using automated techniques. Among the most prominent approaches are Satisfiability Modulo Theory (SMT) and Mixed-Integer Linear Programming (MILP). SMT models the problem as a set of logical constraints whose satisfiability must be determined, while MILP formulates it as an optimization problem with linear objective functions subject to integer (in)equalities. In most existing works, these techniques are employed independently, with each framework used separately to derive differential bounds. In this talk, we explore a different perspective by combining SMT and MILP in a complementary way. We demonstrate how their interaction is leveraged to improve a 7-year-old differential bound of the Ascon permutation.

  • Wednesday, 4th of March 2026 at 12:30 in the big lecture room in Mercator 1 (MERC1_00.28, ground floor)
    DiS Lunch by Yevhen Perehuda

    Attacks and Remedies for Randomness in AI: Cryptanalysis of PHILOX and THREEFRY

    In this work, we address the critical yet understudied question of the security of the most widely deployed pseudorandom number generators (PRNGs) in AI applications. We show that these generators are vulnerable to practical and low-cost attacks. With this in mind, we conduct an extensive survey of randomness usage in current applications to understand the efficiency requirements imposed in practice. Finally, we present a cryptographically secure and well-understood alternative, which has a negligible effect on the overall AI/ML workloads. More generally, we recommend the use of cryptographically strong PRNGs in all contexts where randomness is required, as past experience has repeatedly shown that security requirements may arise unexpectedly even in applications that appear uncritical at first.

  • Past talks