Schedule for Streaming of Pre-recorded Talks
Session 1
-
Encrypted Key-Value Stores
Archita Agarwal and Seny Kamara
-
Proof-of-Reputation Blockchain with Nakamoto Fallback
Leonard Kleinrock, Rafail Ostrovsky, and Vassilis Zikas
-
Transciphering, using FiLIP and TFHE for an efficient delegation of computation
Clément Hoffmann, Pierrick Méaux, and Thomas Ricosset
-
Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing
Krzysztof Pietrzak
Session 2
-
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography
Abhraneel Dutta, Aaron Hutchinson, and Koray Karabina
-
On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices
Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, and Vincent Verneuil
-
Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
Mojtaba Bisheh Niasar, Reza Azarderakhsh, and Mehran Mozaffari Kermani
-
Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings
Carlos Cid, Akinori Hosoyamada, Yunwen Liu, and Siang Meng Sim
-
Evaluation of Quantum Cryptanalysis on SPECK
Ravi Anand, Arpita Maitra, and Sourav Mukhopadhyay
-
Formal Verification of Fair Exchange based on Bitcoin Smart Contracts
Cheng Shi and Kazuki Yoneyama
-
Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Vincent Laporte, and Tiago Oliveira
-
Protocol Analysis with Time
Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña
-
Verifpal: Cryptographic Protocol Analysis for the Real World
Nadim Kobeissi, Georgio Nicolas, and Mukesh Tiwari
Session 3
-
Adaptively secure Threshold Symmetric-key Encryption
Pratyay Mukherjee
-
Vetted Encryption
Martha Norberg Hovd and Martijn Stam
-
Security of Public Key Encryption against Resetting Attacks
Juliane Krämer and Patrick Struck
-
Cryptanalysis of the permutation based algorithm SpoC
Liliya Kraleva, Raluca Posteuca, and Vincent Rijmen
-
More Glimpses of the RC4 Internal State Array
Pranab Chakraborty and Subhamoy Maitra
-
Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box
Lorenzo Grassi and Markus Schofnegger
-
Counting Active S-Boxes is not Enough
Orr Dunkelman, Abhishek Kumar, Eran Lambooij, and Somitra Kumar Sanadhya
-
The Multi-Base Discrete Logarithm Problem
Mihir Bellare and Wei Dai
-
Skipping the q in Group Signatures
Olivier Blazy and Saqib A. Kakvi
-
Incremental Cryptography Revisited: PRFs, Nonces and Modular Design
Vivek Arte, Mihir Bellare, and Louiza Khati
-
Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer
Vivek Arte and Mihir Bellare
-
On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality
Kyosuke Yamashita, Mehdi Tibouchi, and Masayuki Abe
Session 4
-
Making the BKW Algorithm Practical for LWE
Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski Wagner
-
On a dual/hybrid approach to small secret LWE
Thomas Espitau, Antoine Joux, and Natalia Kharchenko
-
Gadget-Based iNTRU Lattice Trapdoors
Nicholas Genise and Baiyu Li
-
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model
Giang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, and Fuchun Guo
-
Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts
Arinjita Paul, S. Sharmila Deva Selvi, and C. Pandu Rangan
-
Adaptive-Secure Identity-Based Inner-Product Functional Encryption and its Leakage-Resilience
Linru Zhang, Xiangning Wang, Yuechen Chen, and Siu-Ming Yiu
-
CCA-Secure ABE using Tag and Pair Encoding
Olivier Blazy and Sayantan Mukherjee
-
Simpler Constructions of Asymmetric Primitives from Obfuscation
Pooya Farshim, Georg Fuchsbauer, and Alain Passelègue
-
Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials
Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura
-
Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
Ashish Choudhury and Nikhil Pappu
-
Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-Party Computation
Ashish Choudhury
-
High Throughput Secure MPC Over Small Population in Hybrid Networks (Extended Abstract)
Ashish Choudhury and Aditya Hegde