Schedule for Streaming of Pre-recorded Talks

Session 1

  1. Encrypted Key-Value Stores

    Archita Agarwal and Seny Kamara

  2. Proof-of-Reputation Blockchain with Nakamoto Fallback

    Leonard Kleinrock, Rafail Ostrovsky, and Vassilis Zikas

  3. Transciphering, using FiLIP and TFHE for an efficient delegation of computation

    Clément Hoffmann, Pierrick Méaux, and Thomas Ricosset

  4. Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

    Krzysztof Pietrzak

Session 2

  1. Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography

    Abhraneel Dutta, Aaron Hutchinson, and Koray Karabina

  2. On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices

    Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, and Vincent Verneuil

  3. Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448

    Mojtaba Bisheh Niasar, Reza Azarderakhsh, and Mehran Mozaffari Kermani

  4. Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings

    Carlos Cid, Akinori Hosoyamada, Yunwen Liu, and Siang Meng Sim

  5. Evaluation of Quantum Cryptanalysis on SPECK

    Ravi Anand, Arpita Maitra, and Sourav Mukhopadhyay

  6. Formal Verification of Fair Exchange based on Bitcoin Smart Contracts

    Cheng Shi and Kazuki Yoneyama

  7. Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification

    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Vincent Laporte, and Tiago Oliveira

  8. Protocol Analysis with Time

    Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña

  9. Verifpal: Cryptographic Protocol Analysis for the Real World

    Nadim Kobeissi, Georgio Nicolas, and Mukesh Tiwari

Session 3

  1. Adaptively secure Threshold Symmetric-key Encryption

    Pratyay Mukherjee

  2. Vetted Encryption

    Martha Norberg Hovd and Martijn Stam

  3. Security of Public Key Encryption against Resetting Attacks

    Juliane Krämer and Patrick Struck

  4. Cryptanalysis of the permutation based algorithm SpoC

    Liliya Kraleva, Raluca Posteuca, and Vincent Rijmen

  5. More Glimpses of the RC4 Internal State Array

    Pranab Chakraborty and Subhamoy Maitra

  6. Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box

    Lorenzo Grassi and Markus Schofnegger

  7. Counting Active S-Boxes is not Enough

    Orr Dunkelman, Abhishek Kumar, Eran Lambooij, and Somitra Kumar Sanadhya

  8. The Multi-Base Discrete Logarithm Problem

    Mihir Bellare and Wei Dai

  9. Skipping the q in Group Signatures

    Olivier Blazy and Saqib A. Kakvi

  10. Incremental Cryptography Revisited: PRFs, Nonces and Modular Design

    Vivek Arte, Mihir Bellare, and Louiza Khati

  11. Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer

    Vivek Arte and Mihir Bellare

  12. On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality

    Kyosuke Yamashita, Mehdi Tibouchi, and Masayuki Abe

Session 4

  1. Making the BKW Algorithm Practical for LWE

    Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski Wagner

  2. On a dual/hybrid approach to small secret LWE

    Thomas Espitau, Antoine Joux, and Natalia Kharchenko

  3. Gadget-Based iNTRU Lattice Trapdoors

    Nicholas Genise and Baiyu Li

  4. Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model

    Giang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, and Fuchun Guo

  5. Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts

    Arinjita Paul, S. Sharmila Deva Selvi, and C. Pandu Rangan

  6. Adaptive-Secure Identity-Based Inner-Product Functional Encryption and its Leakage-Resilience

    Linru Zhang, Xiangning Wang, Yuechen Chen, and Siu-Ming Yiu

  7. CCA-Secure ABE using Tag and Pair Encoding

    Olivier Blazy and Sayantan Mukherjee

  8. Simpler Constructions of Asymmetric Primitives from Obfuscation

    Pooya Farshim, Georg Fuchsbauer, and Alain Passelègue

  9. Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials

    Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura

  10. Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)

    Ashish Choudhury and Nikhil Pappu

  11. Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-Party Computation

    Ashish Choudhury

  12. High Throughput Secure MPC Over Small Population in Hybrid Networks (Extended Abstract)

    Ashish Choudhury and Aditya Hegde