Research

Research interests

Indicators of esteem

    Teaching

    Publications

    Highlights

    • A. Karenin, E. Kirshanova, J. Nowakowski, E. W. Postlethwaite, L. N. Pulles, F. Virdia, P. Vié, Cool + Cruel = Dual, to appear at Eurocrypt 2026, eprint 2025/1002, code
    • G. Fenzi, J. Gilcher, F. Virdia, Finding Bugs and Features Using Cryptographically-Informed Functional Testing, IACR TCHES, 2026(1) and at IACR RWC 2026, eprint 2024/1122, code, DOI
    • N. Bindel, X. Bonnetain, M. Tiepelt, F. Virdia, Quantum Lattice Enumeration in Limited Depth, Crypto 2024, eprint 2023/1423, code, DOI
    • M. Filić, K. G. Paterson, A. Unnikrishnan, F. Virdia, Adversarial Correctness and Privacy for Probabilistic Data Structures, ACM CCS 2022, eprint 2022/1186, code, DOI
    • S. Jaques, M. Naehrig, M. Roetteler, F. Virdia, Implementing Grover oracles for quantum key search on AES and LowMC, Eurocrypt 2020, eprint 2019/1146, code, DOI
    • JP. D’Anvers, M. Rossi, F. Virdia, (One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes, Eurocrypt 2020, eprint 2019/1399, code, DOI
    • M. R. Albrecht, F. Göpfert, F. Virdia, and T. Wunderer, Revisiting the expected cost of solving uSVP and applications to LWE, Asiacrypt 2017, eprint 2017/815, code, DOI
    Lewis Glabush, Patrick Longa, Michael Naehrig, Chris Peikert, Douglas Stebila, Fernando Virdia (2025)FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism, In: IACR Communications in Cryptology (CiC)2(3)2025/1861 IACR

    Large-scale quantum computers capable of implementing Shor's algorithm pose a significant threat to the security of the most widely used public-key cryptographic schemes. This risk has motivated substantial efforts by standards bodies and government agencies to identify and standardize quantum-safe cryptographic systems. Among the proposed solutions, lattice-based cryptography has emerged as the foundation for some of the most promising protocols. This paper describes FrodoKEM, a family of conservative key-encapsulation mechanisms (KEMs) whose security is based on generic, " unstructured " lattices. FrodoKEM is proposed as an alternative to the more efficient lattice schemes that utilize algebraically structured lattices, such as the recently standardized ML-KEM scheme. By relying on generic lattices, FrodoKEM minimizes the potential for future attacks that exploit algebraic structures while enabling simple and compact implementations. Our plain C implementations demonstrate that, despite its conservative design and parameterization, FrodoKEM remains practical. For instance, the full protocol at NIST security level 1 runs in approximately 0.97 ms on a server-class processor, and 4.98 ms on a smartphone-class processor. FrodoKEM obtains (single-target) IND-CCA security using a variant of the Fujisaki– Okamoto transform, applied to an underlying public-key encryption scheme called FrodoPKE. In addition, using a new tool called the Salted Fujisaki–Okamoto (SFO) transform, FrodoKEM is also shown to tightly achieve multi-target security, without increasing the FrodoPKE message length and with a negligible performance impact, based on the multi-target IND-CPA security of FrodoPKE.

    Jan-Pieter D'anvers, Melissa Rossi, Fernando Virdia (2020)(One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes, In: A Canteaut, Y Ishai (eds.), ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III12107pp. 3-33 Springer Nature

    Lattice-based encryption schemes are often subject to the possibility of decryption failures, in which valid encryptions are decrypted incorrectly. Such failures, in large number, leak information about the secret key, enabling an attack strategy alternative to pure lattice reduction. Extending the "failure boosting" technique of D'Anvers et al. in PKC 2019, we propose an approach that we call "directional failure boosting" that uses previously found "failing ciphertexts" to accelerate the search for new ones. We analyse in detail the case where the lattice is defined over polynomial ring modules quotiented by (sic)X-N + 1(sic) and demonstrate it on a simple Mod-LWE-based scheme parametrized a la Kyber768/Saber. We show that for a given secret key (single-target setting), the cost of searching for additional failing ciphertexts after one or more have already been found, can be sped up dramatically. We thus demonstrate that, in this single-target model, these schemes should be designed so that it is hard to even obtain one decryption failure. Besides, in a wider security model where there are many target secret keys (multi-target setting), our attack greatly improves over the state of the art.

    Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia (2020)Improved Classical Cryptanalysis of SIKE in Practice, In: A Kiayias, M Kohlweiss, P Wallden, Zikas (eds.), PUBLIC-KEY CRYPTOGRAPHY - PKC 2020, PT II12111pp. 505-534 Springer Nature

    The main contribution of this work is an optimized implementation of the van Oorschot-Wiener (vOW) parallel collision finding algorithm. As is typical for cryptanalysis against conjectured hard problems (e. g. factoring or discrete logarithms), challenges can arise in the implementation that are not captured in the theory, making the performance of the algorithm in practice a crucial element of estimating security. We present a number of novel improvements, both to generic instantiations of the vOW algorithm finding collisions in arbitrary functions, and to its instantiation in the context of the supersingular isogeny key encapsulation (SIKE) protocol, that culminate in an improved classical cryptanalysis of the computational supersingular isogeny (CSSI) problem. In particular, we present a scalable implementation that can be applied to the Round-2 parameter sets of SIKE that can be used to give confidence in their security levels.

    Samuel Jaques, Michael Naehrig, Martin Roetteler, Fernando Virdia (2020)Implementing Grover Oracles for Quantum Key Search on AES and LowMC, In: A Canteaut, Y Ishai (eds.), ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II12106pp. 280-310 Springer Nature

    Grover's search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses O(root N) calls to the cipher to search a key space of size N. Previous work in the specific case of AES derived the full gate cost by analyzing quantum circuits for the cipher, but focused on minimizing the number of qubits. In contrast, we study the cost of quantum key search attacks under a depth restriction and introduce techniques that reduce the oracle depth, even if it requires more qubits. As cases in point, we design quantum circuits for the block ciphers AES and LowMC. Our circuits give a lower overall attack cost in both the gate count and depth-times-width cost models. In NIST's post-quantum cryptography standardization process, security categories are defined based on the concrete cost of quantum key search against AES. We present new, lower cost estimates for each category, so our work has immediate implications for the security assessment of post-quantum cryptography. As part of this work, we release Q# implementations of the full Grover oracle for AES-128, -192, -256 and for the three LowMC instantiations used in Picnic, including unit tests and code to reproduce our quantum resource estimates. To the best of our knowledge, these are the first two such full implementations and automatic resource estimations.

    Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner (2018)Implementing RLWE-based Schemes Using an RSA Co-Processor, In: IACR transactions on cryptographic hardware and embedded systemspp. 169-208

    We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by exploiting the availability of fast long integer multiplication. Such co-processors are deployed in smart cards in passports and identity cards, secured microcontrollers and hardware security modules (HSM). In particular, we demonstrate an implementation of a variant of the Module-LWE-based Kyber Key Encapsulation Mechanism (KEM) that is tailored for high performance on a commercially available smart card chip (SLE 78). To benefit from the RSA/ECC co-processor we use Kronecker substitution in combination with schoolbook and Karatsuba polynomial multiplication. Moreover, we speed-up symmetric operations in our Kyber variant using the AES co-processor to implement a PRNG and a SHA-256 co-processor to realise hash functions. This allows us to execute CCA-secure Kyber768 key generation in 79.6 ms, encapsulation in 102.4 ms and decapsulation in 132.7 ms.

    Nina Bindel, Xavier Bonnetain, Marcel Tiepelt, Fernando Virdia (2024)Quantum Lattice Enumeration in Limited Depth, In: Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings14925pp. 72-106
    Eamonn W. Postlethwaite, Fernando Virdia (2021)On the Success Probability of Solving Unique SVP via BKZ, In: J A Garay (eds.), PUBLIC-KEY CRYPTOGRAPHY - PKC 2021, PT I12710pp. 68-98 Springer Nature

    As lattice-based key encapsulation, digital signature, and fully homomorphic encryption schemes near standardisation, ever more focus is being directed to the precise estimation of the security of these schemes. The primal attack reduces key recovery against such schemes to instances of the unique Shortest Vector Problem (uSVP). Dachman-Soled et al. (Crypto 2020) recently proposed a new approach for fine-grained estimation of the cost of the primal attack when using Progressive BKZ for lattice reduction. In this paper we review and extend their technique to BKZ 2.0 and provide extensive experimental evidence of its accuracy. Using this technique we also explain results from previous primal attack experiments by Albrecht et al. (Asiacrypt 2017) where attacks succeeded with smaller than expected block sizes. Finally, we use our simulators to reestimate the cost of attacking the three lattice KEM finalists of the NIST Post Quantum Standardisation Process.

    Mia Filic, Kenneth G. Paterson, Anupama Unnikrishnan, Fernando Virdia (2022)Adversarial Correctness and Privacy for Probabilistic Data Structures, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Securitypp. 1037-1050

    We study the security of Probabilistic Data Structures (PDS) for handling Approximate Membership Queries (AMQ); prominent examples of AMQ-PDS are Bloom and Cuckoo filters. AMQ-PDS are increasingly being deployed in environments where adversaries can gain benefit from carefully selecting inputs, for example to increase the false positive rate of an AMQ-PDS. They are also being used in settings where the inputs are sensitive and should remain private in the face of adversaries who can access an AMQ-PDS through an API or who can learn its internal state by compromising the system running the AMQ-PDS. We develop simulation-based security definitions that speak to correctness and privacy of AMQ-PDS. Our definitions are general and apply to a broad range of adversarial settings. We use our definitions to analyse the behaviour of both Bloom filters and insertion-only Cuckoo filters. We show that these AMQ-PDS can be provably protected through replacement or composition of hash functions with keyed pseudorandom functions in their construction. We also examine the practical impact on storage size and computation of providing secure instances of Bloom and insertion-only Cuckoo filters.

    Martin R. Albrecht, Florian Goepfert, Fernando Virdia, Thomas Wunderer (2017)Revisiting the Expected Cost of Solving uSVP and Applications to LWE, In: T Takagi, T Peyrin (eds.), ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I10624pp. 297-322 Springer Nature

    Reducing the Learning with Errors problem (LWE) to the Unique-SVP problem and then applying lattice reduction is a commonly relied-upon strategy for estimating the cost of solving LWE-based constructions. In the literature, two different conditions are formulated under which this strategy is successful. One, widely used, going back to Gama & Nguyen's work on predicting lattice reduction (Eurocrypt 2008) and the other recently outlined by Alkim et al. (USENIX 2016). Since these two estimates predict significantly different costs for solving LWE parameter sets from the literature, we revisit the Unique-SVP strategy. We present empirical evidence from lattice-reduction experiments exhibiting a behaviour in line with the latter estimate. However, we also observe that in some situations lattice-reduction behaves somewhat better than expected from Alkim et al.'s work and explain this behaviour under standard assumptions. Finally, we show that the security estimates of some LWE-based constructions from the literature need to be revised and give refined expected solving costs.

    Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer (2018)Estimate All the {LWE, NTRU} Schemes!, In: D Catalano, R DePrisco (eds.), SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 201811035pp. 351-367 Springer Nature

    We consider all LWE- and NTRU-based encryption, key encapsulation, and digital signature schemes proposed for standardisation as part of the Post-Quantum Cryptography process run by the US National Institute of Standards and Technology (NIST). In particular, we investigate the impact that different estimates for the asymptotic runtime of (block-wise) lattice reduction have on the predicted security of these schemes. Relying on the "LWE estimator" of Albrecht et al., we estimate the cost of running primal and dual lattice attacks against every LWE-based scheme, using every cost model proposed as part of a submission. Furthermore, we estimate the security of the proposed NTRU-based schemes against the primal attack under all cost models for lattice reduction.

    Giacomo Fenzi, Jan Gilcher, Fernando Virdia (2026)Finding Bugs and Features Using Cryptographically-Informed Functional Testing, In: IACR transactions on cryptographic hardware and embedded systems2026(1)pp. 425-447

    In 2018, Mouha et al. (IEEE Trans. Reliability, 2018) performed a post-mortem investigation of the correctness of reference implementations submitted to the SHA3 competition run by NIST, finding previously unidentified bugs in a significant portion of them, including two of the five finalists. Their innovative approach allowed them to identify the presence of such bugs in a black-box manner, by searching for counterexamples of expected cryptographic properties of the implementations under test. In this work, we extend their approach to key encapsulation mechanisms (KEMs) and digital signature schemes (DSSs). We perform our tests on multiple versions of the LibOQS collection of post-quantum schemes to capture implementations at different points of the recent Post-Quantum Cryptography Standardization Process run by NIST. We identify multiple bugs, ranging from software bugs (segmentation faults, memory overflows) to cryptographic bugs, such as ciphertext malleability in KEMs claiming IND-CCA security. We also observe various features of KEMs and DSSs that do not contradict any security guarantees but could appear counter-intuitive. Finally, we compare this methodology with a traditional fuzzing campaign against LibOQS and SUPERCOP, observing that traditional fuzzing harnesses appear less effective in surfacing software and logical bugs.

    Additional publications