Programme Schedule


Chairs: Chris Brzuska, Anat Paskin-Cherniavsky

Constructive Cryptography

Ueli Maurer, Chen-Da Liu-Zhang, Marta Mularczyk

Opening Remarks

Chairs: Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran


Chairs: Chris Brzuska, James Howe

Encrypted Key-Value Stores

Archita Agarwal and Seny Kamara

Proof-of-Reputation Blockchain with Nakamoto Fallback

Leonard Kleinrock, Rafail Ostrovsky, and Vassilis Zikas

Transciphering, using FiLIP and TFHE for an efficient delegation of computation

Clément Hoffmann, Pierrick Méaux, Thomas Ricosset

Delayed Authentication: Preventing Replay and Relay Attacks in Private Contact Tracing

Krzysztof Pietrzak

Implementing Elliptic Curve Cryptography

Chairs: Peter Schwabe, Pratyay Mukherjee

Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography

Abhraneel Dutta, Aaron Hutchinson, and Koray Karabina

On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices

Melissa Azouaoui, François Durvaux, Romain Poussier, François-Xavier Standaert, Kostas Papagiannopoulos, and Vincent Verneuil

Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448

Mojtaba Bisheh Niasar, Reza Azarderakhsh, and Mehran Mozaffari Kermani

Quantum Cryptanalysis

Chairs: Peter Schwabe, Pratyay Mukherjee

Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings

Carlos Cid, Akinori Hosoyamada, Yunwen Liu, and Siang Meng Sim

Evaluation of Quantum Cryptanalysis on SPECK

Ravi Anand, Arpita Maitra, and Sourav Mukhopadhyay

Formal Methods

Chairs: S P Suresh, Deepak Garg

Formal Verification of Fair Exchange based on Bitcoin Smart Contracts

Cheng Shi and Kazuki Yoneyama

Certified Compilation for Cryptography: Extended x86 Instructions and Constant-Time Verification

José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Vincent Laporte, and Tiago Oliveira

Protocol Analysis with Time

Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, and Julia Sapiña

Verifpal: Cryptographic Protocol Analysis for the Real World

Nadim Kobeissi, Georgio Nicolas, and Mukesh Tiwari

Invited Talk

Chairs: Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran

Can We Have Truly Secure Information Systems? Combining Formal Analysis and Cryptography is Key

Ran Canetti


Chairs: R Ramanujam, Shashank Agrawal, Bhavana Kanukurthi

Adaptively secure Threshold Symmetric-key Encryption

Pratyay Mukherjee

Vetted Encryption

Martha Norberg Hovd and Martijn Stam

Security of Public Key Encryption against Resetting Attacks

Juliane Krämer and Patrick Struck

Ciphers and Cryptanalysis

Chairs: Raphael Phan, Maria Eichlseder

Cryptanalysis of the permutation based algorithm SpoC

Liliya Kraleva, Raluca Posteuca, and Vincent Rijmen

More Glimpses of the RC4 Internal State Array

Pranab Chakraborty and Subhamoy Maitra

Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box

Lorenzo Grassi and Markus Schofnegger

Counting Active S-Boxes is not Enough

Orr Dunkelman, Abhishek Kumar, Eran Lambooij, and Somitra Kumar Sanadhya

Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers

Maria Eichlseder, Gregor Leander, and Shahram Rasoolzadeh


Chairs: Markulf Kohlweiss, James Howe, Venkata Koppula

The Multi-Base Discrete Logarithm Problem

Mihir Bellare and Wei Dai

Skipping the q in Group Signatures

Olivier Blazy and Saqib A. Kakvi

Incremental Cryptography Revisited: PRFs, Nonces and Modular Design

Vivek Arte, Mihir Bellare, and Louiza Khati

Non-Interactive Zero-Knowledge Proofs

Chairs: Markulf Kohlweiss, James Howe, Bhavana Kanukurthi

Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer

Vivek Arte and Mihir Bellare

On Black-Box Extension of a Non-Interactive Zero-Knowledge Proof System for Secret Equality

Kyosuke Yamashita, Mehdi Tibouchi, and Masayuki Abe

Invited Talk

Chairs: Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran

Electronic Voting: How Formal Methods Can Help

Véronique Cortier

Learning With Errors

Chairs: Ryo Nishimaki, Peter Schwabe, Bhavana Kanukurthi

Making the BKW Algorithm Practical for LWE

Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, and Paul Stankovski Wagner

On a dual/hybrid approach to small secret LWE

Thomas Espitau, Antoine Joux, and Natalia Kharchenko

Functional Encryption

Chairs: Pratyay Mukherjee, Shashank Agrawal, Shweta Agrawal

Gadget-Based iNTRU Lattice Trapdoors

Nicholas Genise and Baiyu Li

Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model

Giang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, and Fuchun Guo

Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts

Arinjita Paul, S. Sharmila Deva Selvi, and C. Pandu Rangan

Adaptive-Secure Identity-Based Inner-Product Functional Encryption and its Leakage-Resilience

Linru Zhang, Xiangning Wang, Yuechen Chen, and Siu-Ming Yiu

CCA-Secure ABE using Tag and Pair Encoding

Olivier Blazy and Sayantan Mukherjee

Simpler Constructions of Asymmetric Primitives from Obfuscation

Pooya Farshim, Georg Fuchsbauer, and Alain Passelègue

Secure Multi-Party Computation

Chairs: Carmit Hazay, Venkata Koppula, Anat Paskin-Cherniavsky

Adaptive Security of Practical Garbling Schemes

Zahra Jafargholi and Sabine Oechsner

Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials

Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, and Kanta Matsuura

Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)

Ashish Choudhury and Nikhil Pappu

Improving the Efficiency of Optimally-Resilient Statistically-Secure Asynchronous Multi-Party Computation

Ashish Choudhury

High Throughput Secure MPC Over Small Population in Hybrid Networks (Extended Abstract)

Ashish Choudhury and Aditya Hegde

Invited Talk

Chairs: Karthikeyan Bhargavan, Elisabeth Oswald, Manoj Prabhakaran

Engineering Privacy in Contact Tracing Apps

Carmela Troncoso