Accepted Papers
Applications
-
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak (IST Austria)
-
Proof-of-Reputation Blockchain with Nakamoto Fallback
Leonard Kleinrock (UCLA), Rafail Ostrovsky (UCLA), and Vassilis Zikas (University of Edinburgh)
-
Transciphering, using FiLIP and TFHE for an efficient delegation of computation
Clément Hoffmann (Université catholique de Louvain), Pierrick Méaux (Université catholique de Louvain), and Thomas Ricosset (Thales)
-
Encrypted Key-Value Stores
Archita Agarwal (Brown University) and Seny Kamara (Brown University)
Formal Methods
-
Formal Verification of Fair Exchange based on Bitcoin Smart Contracts
Cheng Shi (Ibaraki University) and Kazuki Yoneyama (Ibaraki University)
-
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
José Bacelar Almeida (Universidade do Minho), Manuel Barbosa (Universidade do Porto), Gilles Barthe (Max Planck Institute for Security and Privacy), Vincent Laporte (Université de Lorraine), and Tiago Oliveira (Universidade do Porto)
-
Protocol Analysis with Time
Damián Aparicio-Sánchez (Universitat Politècnica de València), Santiago Escobar (Universitat Politècnica de València), Catherine Meadows (Naval Research Laboratory), José Meseguer (University of Illinois at Urbana-Champaign), and Julia Sapiña (Universitat Politècnica de València)
-
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi (Symbolic Software), Georgio Nicolas (Symbolic Software), and Mukesh Tiwari (University of Melbourne)
Implementing Elliptic Curve Cryptography
-
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
Melissa Azouaoui (Université catholique de Louvain; NXP Semiconductors), François Durvaux (Université catholique de Louvain; Silex Insight), Romain Poussier (Nanyang Technological University), François-Xavier Standaert (Université catholique de Louvain), Kostas Papagiannopoulos (NXP Semiconductors), and Vincent Verneuil (NXP Semiconductors)
-
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
Mojtaba Bisheh Niasar (Florida Atlantic University), Reza Azarderakhsh (Florida Atlantic University; PQSecure Technologies), and Mehran Mozaffari Kermani (University of South Florida)
-
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta (Florida Atlantic University), Aaron Hutchinson (University of Waterloo), and Koray Karabina (National Research Council Canada)
Ciphers and Cryptanalysis
-
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva (KU Leuven), Raluca Posteuca (KU Leuven), and Vincent Rijmen (KU Leuven; University of Bergen)
-
More Glimpses of the RC4 Internal State Array
Pranab Chakraborty (Wipro Limited) and Subhamoy Maitra (Indian Statistical Institute)
-
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi (Radboud University; Graz University of Technology) and Markus Schofnegger (Graz University of Technology)
-
Counting Active S-Boxes is not Enough
Orr Dunkelman (University of Haifa), Abhishek Kumar (Indian Institute of Technology Ropar), Eran Lambooij (University of Haifa), and Somitra Kumar Sanadhya (Indian Institute of Technology Ropar)
-
Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers
Maria Eichlseder (Ruhr University Bochum; Graz University of Technology), Gregor Leander (Ruhr University Bochum), and Shahram Rasoolzadeh (Ruhr University Bochum)
Quantum Cryptanalysis
-
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings
Carlos Cid (University of London; Simula UiB), Akinori Hosoyamada (NTT Secure Platform Laboratories), Yunwen Liu (National University of Defense Technology), and Siang Meng Sim (DSO National Laboratories)
-
Evaluation of Quantum Cryptanalysis on SPECK
Ravi Anand (Indian Institute of Technology Kharagpur), Arpita Maitra (TCG Centres for Research and Education in Science and Technology), and Sourav Mukhopadhyay (Indian Institute of Technology Kharagpur)
Learning With Errors
-
Making the BKW Algorithm Practical for LWE
Alessandro Budroni (University of Bergen), Qian Guo (Lund University; University of Bergen), Thomas Johansson (Lund University), Erik Mårtensson (Lund University), and Paul Stankovski Wagner (Lund University)
-
On a dual/hybrid approach to small secret LWE
Thomas Espitau (NTT Corporation), Antoine Joux (Sorbonne Université and Université de Paris; CISPA Helmholtz Center for Information Security Saarbrücken), and Natalia Kharchenko (Sorbonne Université)
Encryption and Signatures
-
Adaptively secure Threshold Symmetric-key Encryption
Pratyay Mukherjee (Visa Research)
-
Vetted Encryption
Martha Norberg Hovd (Simula UiB; University of Bergen) and Martijn Stam (Simula UiB)
-
Security of Public Key Encryption against Resetting Attacks
Juliane Krämer (Technische Universität Darmstadt) and Patrick Struck (Technische Universität Darmstadt)
-
The Multi-Base Discrete Logarithm Problem
Mihir Bellare (University of California San Diego) and Wei Dai (University of California San Diego)
-
Skipping the q in Group Signatures
Olivier Blazy (Université de Limoges) and Saqib A. Kakvi (Bergische Universität Wuppertal)
-
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
Vivek Arte (University of California San Diego), Mihir Bellare (University of California San Diego), and Louiza Khati (ANSSI)
Functional Encryption
-
Gadget-Based iNTRU Lattice Trapdoors
Nicholas Genise (SRI International) and Baiyu Li (University of California San Diego)
-
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
Giang Linh Duc Nguyen (Futurify Software Development), Willy Susilo (University of Wollongong), Dung Hoang Duong (University of Wollongong), Huy Quoc Le (University of Wollongong; CSIRO Data61), and Fuchun Guo (University of Wollongong)
-
Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul (Indian Institute of Technology Madras), S. Sharmila Deva Selvi (Indian Institute of Technology Madras), and C. Pandu Rangan (Indian Institute of Technology Madras)
-
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and its Leakage-Resilience
Linru Zhang (The University of Hong Kong), Xiangning Wang (The University of Hong Kong), Yuechen Chen (The University of Hong Kong), and Siu-Ming Yiu (The University of Hong Kong)
-
CCA-Secure ABE using Tag and Pair Encoding
Olivier Blazy (University of Limoges) and Sayantan Mukherjee (University of Limoges)
-
Simpler Constructions of Asymmetric Primitives from Obfuscation
Pooya Farshim (University of York), Georg Fuchsbauer (TU Wien), and Alain Passelègue (Inria and ENS Lyon)
Secure Multi-Party Computation
-
Adaptive Security of Practical Garbling Schemes
Zahra Jafargholi (Sepior) and Sabine Oechsner (Aarhus University)
-
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials
Kittiphop Phalakarn (The University of Tokyo), Vorapong Suppakitpaisarn (The University of Tokyo), Nuttapong Attrapadung (National Institute of Advanced Industrial Science and Technology), and Kanta Matsuura (The University of Tokyo)
-
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
Ashish Choudhury (International Institute of Information Technology Bangalore) and Nikhil Pappu (International Institute of Information Technology Bangalore)
-
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-Party Computation
Ashish Choudhury (International Institute of Information Technology Bangalore)
-
High Throughput Secure MPC Over Small Population in Hybrid Networks (Extended Abstract)
Ashish Choudhury (International Institute of Information Technology Bangalore) and Aditya Hegde (International Institute of Information Technology Bangalore)
Non-Interactive Zero-Knowledge Proofs
-
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte (University of California San Diego) and Mihir Bellare (University of California San Diego)
-
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality
Kyosuke Yamashita (Kyoto University; National Institute of Advanced Industrial Science and Technology), Mehdi Tibouchi (Kyoto University; NTT Corporation), and Masayuki Abe (Kyoto University; NTT Corporation)