Skip to contentSkip to content
Conference Program
Session 1: March 1st, GMT 3pm-5pm
Public key cryptography
Chairs: O. Blazy and T. Moataz
- Multicast Key Agreement, Revisited
- A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
- Approximate Homomorphic Encryption with Reduced Approximation Error
Theory
Chairs: D. Pointcheval and J. Traore
- On Fingerprinting Attacks and Length-Hiding Encryption
- CCA security for Posteriori Openable Encryption and Generic Instantiation in the Standard Model.
- Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Post-quantum cryptography/isogeny
Chairs: P. Gaudry and L. De Feo
- Faster Isogenies for Quantum-Safe SIKE
- Fully projective radical isogenies in constant-time
- A New Adaptive Attack on SIDH
Session 2: March 2nd, GMT 1am-3am
Lattices
Chairs: S. Galbraith and P. Fauzi
- Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
- More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes
Symmetric Cryptanalysis
Chairs: Y. Sasaki and Q. Tang
- Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
- Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
- Side-Channeling the Kalyna Key Expansion
Session 3: March 2nd, GMT 3pm-5pm
Symmetric Cryptography
Chairs: B. Minaud and A. Roy
- FASTA – a stream cipher for fast FHE evaluation
- New Attacks from Old Distinguishers, Improved Attacks on Serpent
- Pholkos – Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Cryptanalysis
Chairs: H. Handschuh and F. Virdia
- Attacks on Pseudo Random Number Generators Hiding a Linear Structure
- Fake it till you make it: data augmentation using Generative Adversarial Networks for all the crypto you need on small devices
Signatures & NIZK
Chairs: G. Marson and L. Siniscalchi
- Robust Subgroup Multi-Signatures for Consensus
- Subversion-Resilient Enhanced Privacy ID
- PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument
MPC
Chairs: S. Jarecki and M. Rosulek
- Adaptively Secure Laconic Function Evaluation for NC1
- Private Liquidity Matching using MPC