Helger Lipmaa's Avatar

Helger Lipmaa

@helger.bsky.social

Cryptography professor at the University of Tartu, Estonia. Zero-Knowledge. SNARKs.

553 Followers  |  264 Following  |  176 Posts  |  Joined: 02.02.2024  |  1.5469

Latest posts by helger.bsky.social on Bluesky

Post image

#QIP2026 is coming to Riga in less than a week!
Very excited to find my university (pictured) at the epicenter of a global academic event.

PSA: Pack some *really* warm clothing - we've got a real winter this time โ„๏ธ

19.01.2026 20:02 โ€” ๐Ÿ‘ 15    ๐Ÿ” 5    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

By an ex student (Behzad)

22.01.2026 11:08 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
=== FOR trend summary (up/down counts across changed conferences) ===
 FOR  up  down  net
4608   4     0    4
4604   2     1    1
4605   0     1   -1
4607   0     1   -1
4602   1     3   -2
4612   1     4   -3
4606   1     5   -4
4613   2    13  -11

=== FOR trend summary (up/down counts across changed conferences) === FOR up down net 4608 4 0 4 4604 2 1 1 4605 0 1 -1 4607 0 1 -1 4602 1 3 -2 4612 1 4 -3 4606 1 5 -4 4613 2 13 -11

New ICORE conference rankings are out. Theory, logic and formal methods seem to have been heavily penalised. I vibe coded an analysis of, for each Field of Research (FOR), how many associated venues increased or decreased in rank. Here's the summary. FOR 4613 had 13 venues decrease their rank! 1/2

21.01.2026 06:43 โ€” ๐Ÿ‘ 8    ๐Ÿ” 4    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 1

What is wild to me is the defense, BY THE NEURIPS BOARD, that fabricated citations do not mean "the content of the papers themselves [is] necessarily invalidated"

It does. It very much does. What do you think citing other work is for? What do you think writing a paper is for? What do you *think*?

21.01.2026 21:34 โ€” ๐Ÿ‘ 247    ๐Ÿ” 76    ๐Ÿ’ฌ 16    ๐Ÿ“Œ 11

In 1943, Norwegian author Knut Hamsun gave his Nobel Prize to Joseph Goebbels. So history _does_ repeat itself.

17.01.2026 04:10 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

that's an interesting experiment (as a cryptographer, i am of course worried by adversarial authors)

12.01.2026 19:34 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

what do you mean by slow month? Christmas means no committee meetings.

06.01.2026 12:34 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

This sounds really cool

06.01.2026 12:32 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

New year, new pairing

03.01.2026 12:23 โ€” ๐Ÿ‘ 14    ๐Ÿ” 4    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

3a didn't take long

03.01.2026 11:04 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Super exciting work from Ziyi and Eylon! They construct the first SNARG for NP in the *plain* model (no random oracle) using *only* (subexponential) LWE!
Perhaps most surprisingly, the SNARG is one (very clever) instantiation of the classical Killian-Micali construction!

29.12.2025 13:38 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
The Biggest Breakthroughs in Mathematics: 2025
YouTube video by Quanta Magazine The Biggest Breakthroughs in Mathematics: 2025

It was a big year for mathematics. youtu.be/hRpcWpAeWng

18.12.2025 20:18 โ€” ๐Ÿ‘ 47    ๐Ÿ” 18    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 2
IACR Communications in Cryptology

Your quarterly reminder to submit a paper to Communications in Cryptology...

cic.iacr.org

It is Diamond Open Access (readers and authors do not pay) and it contains all your new cool cryptographic research.

Next deadline for submission is Feb 2nd.

19.12.2025 08:02 โ€” ๐Ÿ‘ 8    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

2 tons of vegemite?

16.12.2025 02:24 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

Reviewers should also state if LLMs are permitted to be used, be coauthors, or main authors of the reviewed papers

11.12.2025 22:00 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Ask the LLM to ignore the spam folder

11.12.2025 21:56 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

as those of a toddler, yes

11.12.2025 14:39 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

The entries of rebuttal that correspond to personal attacks will only be visible to the reviewers after your papers has been rejected

11.12.2025 12:05 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

The rebuttal only has to correct technical misunderstandings and not resort to personal attacks

11.12.2025 12:01 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

There's only one house so ugly...

11.12.2025 11:58 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Cryptographers Show That AI Protections Will Always Have Holes | Quanta Magazine Large language models such as ChatGPT come with filters to keep certain info from getting out. A new mathematical argument shows that systems like this can never be completely safe.

If you swap each letter in โ€œbombโ€ with the next letter in the alphabet, youโ€™ll get โ€œcpnc.โ€ Recently, scientists showed that and other methods can bypass filters on LLMs like Gemini, DeepSeek and Grok. @peterha2l.bsky.social reports: www.quantamagazine.org/cryptographe...

10.12.2025 15:42 โ€” ๐Ÿ‘ 23    ๐Ÿ” 8    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Abstract. We prove that SVP_(p) is NP-hard to approximate within a factor of 2^(log^(1โ€…โˆ’โ€…ฮต)n), for all constants ฮตโ€„>โ€„0 and pโ€„>โ€„2, under standard deterministic Karp reductions. This result is also the first proof that SVP_(p) is NP-hard in a finite โ„“_(p) norm. Hardness for SVP_(p) with p finite was previously only known if NP โŠˆ RP, and under that assumption, hardness of approximation was only known for all constant factors. As a corollary to our main theorem, we show that under the Sliding Scale Conjecture, SVP_(p) is NP-hard to approximate within a small polynomial factor, for all constants pโ€„>โ€„2.

Our proof techniques are surprisingly elementary; we reduce from a regularized PCP instance directly to the shortest vector problem by using simple gadgets related to Vandermonde matrices and Hadamard matrices.

Abstract. We prove that SVP_(p) is NP-hard to approximate within a factor of 2^(log^(1โ€…โˆ’โ€…ฮต)n), for all constants ฮตโ€„>โ€„0 and pโ€„>โ€„2, under standard deterministic Karp reductions. This result is also the first proof that SVP_(p) is NP-hard in a finite โ„“_(p) norm. Hardness for SVP_(p) with p finite was previously only known if NP โŠˆ RP, and under that assumption, hardness of approximation was only known for all constant factors. As a corollary to our main theorem, we show that under the Sliding Scale Conjecture, SVP_(p) is NP-hard to approximate within a small polynomial factor, for all constants pโ€„>โ€„2. Our proof techniques are surprisingly elementary; we reduce from a regularized PCP instance directly to the shortest vector problem by using simple gadgets related to Vandermonde matrices and Hadamard matrices.

SVP_(p) is Deterministically NP-Hard for all pโ€„>โ€„2, Even to Approximate Within a Factor of 2^(log^(1โ€…โˆ’โ€…ฮต)n) (Isaac M Hair, Amit Sahai) ia.cr/2025/2181

02.12.2025 22:58 โ€” ๐Ÿ‘ 7    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

how many of them are virtual? Those should not really count...

08.12.2025 15:08 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Abstract. Hash-based succinct non-interactive arguments (SNARGs) are a widely studied and deployed class of proof systems. The security of practical hash-based SNARGs relies on two combinatorial parameters of its underlying linear code ๐’ž: a distance-preservation error ฮต(๐’ž,โ€†ฮด) and the list size |ฮ›(๐’ž,โ€†ฮด)| (both parametrized by a proximity parameter ฮด). Optimistically, one might hope that these parameters are bounded all the way to the capacity regime: when the proximity parameter ฮด approaches the minimum distance of the code ฮด(๐’ž). Perhaps too optimistically, several deployed hash-based SNARGs indeed operate in this regime, and initiatives such as the Ethereum Proximity Prize investigate to which extent soundness is preserved in this setting.

We present a minimal toy protocol whose analysis captures most of the complexity of state-of-the-art hash-based SNARGs, and present a generic attack whose success probability depends on the list size |ฮ›(๐’ž,โ€†ฮด)|. Further, we investigate the common settings when the code ๐’ž is an extension code over a field ๐”ฝ of a base code ๐’ž_(๐”น) over a small base field ๐”น. In this setting, we show that classical combinatorial lower bounds on the list-size of the code yields strong attacks that affect the regimes in which hash-based SNARGs operate in practice.

Abstract. Hash-based succinct non-interactive arguments (SNARGs) are a widely studied and deployed class of proof systems. The security of practical hash-based SNARGs relies on two combinatorial parameters of its underlying linear code ๐’ž: a distance-preservation error ฮต(๐’ž,โ€†ฮด) and the list size |ฮ›(๐’ž,โ€†ฮด)| (both parametrized by a proximity parameter ฮด). Optimistically, one might hope that these parameters are bounded all the way to the capacity regime: when the proximity parameter ฮด approaches the minimum distance of the code ฮด(๐’ž). Perhaps too optimistically, several deployed hash-based SNARGs indeed operate in this regime, and initiatives such as the Ethereum Proximity Prize investigate to which extent soundness is preserved in this setting. We present a minimal toy protocol whose analysis captures most of the complexity of state-of-the-art hash-based SNARGs, and present a generic attack whose success probability depends on the list size |ฮ›(๐’ž,โ€†ฮด)|. Further, we investigate the common settings when the code ๐’ž is an extension code over a field ๐”ฝ of a base code ๐’ž_(๐”น) over a small base field ๐”น. In this setting, we show that classical combinatorial lower bounds on the list-size of the code yields strong attacks that affect the regimes in which hash-based SNARGs operate in practice.

Image showing part 2 of abstract.

Image showing part 2 of abstract.

Small-field hash-based SNARGs are less sound than conjectured (Giacomo Fenzi, Antonio Sanso) ia.cr/2025/2197

05.12.2025 11:03 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

I've been going over the responses to the survey from IACR members about publishing and conferences, and I keep coming back to the fact that I think there should be _fewer_ conferences and _more_ journals. This coupling of talks to papers is not healthy.

05.12.2025 22:04 โ€” ๐Ÿ‘ 9    ๐Ÿ” 3    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

i think you will now be famous only because of this picture and nothing else you did in your life

23.11.2025 13:33 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

(By ... an exstudent, Shuto)

22.11.2025 21:49 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Cryptographers Held an Election. They Canโ€™t Decrypt the Results.

Look, ma, we are in the News www.nytimes.com/2025/11/21/w...

22.11.2025 02:51 โ€” ๐Ÿ‘ 13    ๐Ÿ” 3    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

by ex-student (Hamid)

21.11.2025 15:47 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Publishing and communicating research in AI/ML is fundamentally broken Why researchers should care, and four proposals for how to fix it

While I can understand how some reviewers in cryptography research are frustrated with the process, I cannot imagine how bad it is in machine learning. ncfrey.substack.com/p/publishing...

15.11.2025 08:30 โ€” ๐Ÿ‘ 2    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@helger is following 20 prominent accounts