Conference Program

Session 1: March 1st, GMT 3pm-5pm

Public key cryptography
Chairs: O. Blazy and T. Moataz
  • Multicast Key Agreement, Revisited
  • A Pairing-Free Signature Scheme from Correlation Intractable Hash Function and Strong Diffie-Hellman Assumption
  • Approximate Homomorphic Encryption with Reduced Approximation Error
Chairs: D. Pointcheval and J. Traore
  • On Fingerprinting Attacks and Length-Hiding Encryption
  • CCA security for Posteriori Openable Encryption and Generic Instantiation in the Standard Model.
  • Dynamic Universal Accumulator with Batch Update over Bilinear Groups
Post-quantum cryptography/isogeny
Chairs: P. Gaudry and L. De Feo
  • Faster Isogenies for Quantum-Safe SIKE
  • Fully projective radical isogenies in constant-time
  • A New Adaptive Attack on SIDH

Session 2: March 2nd, GMT 1am-3am

Chairs: S. Galbraith and P. Fauzi
  • Lattice-based Fault Attacks on Deterministic Signature Schemes of ECDSA and EdDSA
  • More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes
Symmetric Cryptanalysis
Chairs: Y. Sasaki and Q. Tang
  • Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
  • Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
  • Side-Channeling the Kalyna Key Expansion

Session 3: March 2nd, GMT 3pm-5pm

Symmetric Cryptography
Chairs: B. Minaud and A. Roy
  • FASTA – a stream cipher for fast FHE evaluation
  • New Attacks from Old Distinguishers, Improved Attacks on Serpent
  • Pholkos – Efficient Large-state Tweakable Block Ciphers from the AES Round Function
Chairs: H. Handschuh and F. Virdia
  • Attacks on Pseudo Random Number Generators Hiding a Linear Structure
  • Fake it till you make it: data augmentation using Generative Adversarial Networks for all the crypto you need on small devices
Signatures & NIZK
Chairs: G. Marson and L. Siniscalchi
  • Robust Subgroup Multi-Signatures for Consensus
  • Subversion-Resilient Enhanced Privacy ID
  • PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument
Chairs: S. Jarecki and M. Rosulek
  • Adaptively Secure Laconic Function Evaluation for NC1
  • Private Liquidity Matching using MPC