December 9, 2018:
Tutorials
- Tutorial 1: Introduction to the sponge and duplex constructions
Gilles Van Assche, STMicroelectronics, Belgium
slides
- Tutorial 2: Cryptographic properties of Keccak
Gilles Van Assche, STMicroelectronics, Belgium
slides
- Tutorials 3 and 4: Public Key Encryption and Security against Chosen Ciphertext Attacks
Takahiro Matsuda, National Institute of Advanced Industrial Science and Technology (AIST), Japan
slides
December 10, 2018
- On dec(k) functions (Invited Talk)
Gilles Van Assche
slides
- Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation
Jothi Rangasamy; Lakshmi Kuppusamy
slides
- Keyword Search Meets Membership Testing: Adaptive Security from SXDH
Sanjit Chatterjee; Sayantan Mukherjee
slides
- Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme
Avijit Dutta; Mridul Nandi
slides
- Reconsidering Generic Composition: the Tag-then-Encrypt case
Francesco Berti; Olivier Pereira; Thomas Peters
slides
- On Diffusion Layers Of SPN Based Format Preserving Encryption Schemes: Format Preserving Sets Revisited
Rana Barua; Kishan Chand Gupta; Sumit Kumar Pandey; Indranil Ghosh Ray
slides
- Differential Fault Attack on SIMON with Very Few Faults
Ravi Anand; Akhilesh Siddhanti; Subhamoy Maitra; Sourav Mukhopadhyay
slides
- Cryptanalysis of 2 round Keccak-384
Rajendra Kumar; Nikhil Mittal; Shashank Singh
slides
December 11, 2018
- Public Key Encryption Secure against Related Randomness Attacks (Invited talk)
Takahiro Matsuda
slides
- A faster way to the CSIDH
Michael Meyer; Steffen Reith
slides
- A note on the security of CSIDH
Jean-François Biasse; Annamaria Iezzi; Michael J. Jacobson Jr
slides
- Constructing Canonical Strategies For Parallel Implementation Of Isogeny Based Cryptography
Aaron Hutchinson; Koray Karabina
slides
- More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers
Hart W. Montgomery
slides
- A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem
Ayan Mahalanobis; Vivek Mallick; Ansari Abdullah
slides
- Pairing-Friendly Twisted Hessian Curves
Chitchanok Chuengsatiansup; Chloe Martindale
slides
- A Family of FDH Signature Schemes Based on the Quadratic Residuosity Assumption
Giuseppe Ateniese; Katharina Fech; Bernardo Magri
slides
- Using MILP in Analysis of Feistel Structures and Improving Type II GFS by
Switching Mechanism
Mahdi Sajadieh and Mohammad Vaziri
slides
- Tools in analyzing linear approximation for Boolean functions related to FLIP
Subhamoy Maitra; Bimal Mandal; Thor Martinsen; Dibyendu Roy; Pantelimon Stanica
slides
December 12, 2018
- How To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (Invited talk)
Mridul Nandi
slides
- Non-malleable Codes against Lookahead Tampering
Divya Gupta; Hemanta K. Maji; Mingyuan Wang
slides
- Obfuscation from Low Noise Multilinear Maps
Nico Döttling; Sanjam Garg; Divya Gupta; Peihan Miao; Pratyay Mukherjee
slides
- Non-Interactive and Fully Output Expressive Private Comparison
Yu Ishimaki; Hayato Yamana
- Secure Computation with Constant Communication Overhead using Multiplication Embeddings
Alexander R. Block; Hemanta K. Maji; Hai H. Nguyen
slides