EUROCRYPT 2021:
Anne Canteaut François-Xavier Standaert (Eds.):Eurocrypt 2021
Zagreb, Croatia
October 17-21, 2021
Proceedings cryptodb information for EUROCRYPT 2021
Organizational Committee
Program Chairs: Anne Canteaut and François-Xavier Standaert
General Chairs: Lejla Batina and Stjepan Picek
Program Committee
Shweta Agrawal
Joël Alwen
Foteini Baldimtsi
Marshall Ball
Begül Bilgin
Nir Bitansky
Joppe W. Bos
Christina Boura
Wouter Castryck
Kai-Min Chung
Jean-Sébastien Coron
Véronique Cortier
Geoffroy Couteau
Luca De Feo
Léo Ducas
Orr Dunkelman
Stefan Dziembowski
Thomas Eisenbarth
Dario Fiore
Marc Fischlin
Benjamin Fuller
Adrià Gascón
Henri Gilbert
Shai Halevi
Annelie Heuser
Naofumi Homma
Kristina Hostáková
Tetsu Iwata
Marc Joye
Pascal Junod
Pierre Karpman
Gregor Leander
Benoît Libert
Julian Loss
Christian Majenz
Daniel Masny
Bart Mennink
Tarik Moataz
Amir Moradi
Michael Naehrig
María Naya-Plasencia
Claudio Orlandi
Elisabeth Oswald
Daniel Page
Rafael Pass
Thomas Peyrin
Oxana Poburinnaya
Matthieu Rivain
Adeline Roux-Langlois
Louis Salvail
Yu Sasaki
Tobias Schneider
Yannick Seurin
Emmanuel Thomé
Vinod Vaikuntanathan
Prashant Nalini Vasudevan
Daniele Venturi
Daniel Wichs
Yu Yu
Program Chairs: Anne Canteaut and François-Xavier Standaert
General Chairs: Lejla Batina and Stjepan Picek
Program Committee
Shweta Agrawal
Joël Alwen
Foteini Baldimtsi
Marshall Ball
Begül Bilgin
Nir Bitansky
Joppe W. Bos
Christina Boura
Wouter Castryck
Kai-Min Chung
Jean-Sébastien Coron
Véronique Cortier
Geoffroy Couteau
Luca De Feo
Léo Ducas
Orr Dunkelman
Stefan Dziembowski
Thomas Eisenbarth
Dario Fiore
Marc Fischlin
Benjamin Fuller
Adrià Gascón
Henri Gilbert
Shai Halevi
Annelie Heuser
Naofumi Homma
Kristina Hostáková
Tetsu Iwata
Marc Joye
Pascal Junod
Pierre Karpman
Gregor Leander
Benoît Libert
Julian Loss
Christian Majenz
Daniel Masny
Bart Mennink
Tarik Moataz
Amir Moradi
Michael Naehrig
María Naya-Plasencia
Claudio Orlandi
Elisabeth Oswald
Daniel Page
Rafael Pass
Thomas Peyrin
Oxana Poburinnaya
Matthieu Rivain
Adeline Roux-Langlois
Louis Salvail
Yu Sasaki
Tobias Schneider
Yannick Seurin
Emmanuel Thomé
Vinod Vaikuntanathan
Prashant Nalini Vasudevan
Daniele Venturi
Daniel Wichs
Yu Yu
- Best Paper Awards
- Public Key Cryptography and Isogenies
- Analysing the HPKE Standard,
Eike Kiltz, Joël Alwen, Bruno Blanchet, Eduard Hauck, Doreen Riepel, Benjamin Lipp,
bibinfo, video - Tightly-Secure Authenticated Key Exchange, Revisited,
Eike Kiltz, Tibor Jager, Sven Schäge, Doreen Riepel,
bibinfo, video - Aggregatable Distributed Key Generation,
Sarah Meiklejohn, Philipp Jovanovic, Mary Maller, Kobi Gurkan, Gilad Stern, Alin Tomescu,
bibinfo, video - Decentralized Multi-Authority ABE for DNFs from LWE,
Brent Waters, Ilan Komargodski, Pratish Datta,
bibinfo, video - Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer,
Steven D. Galbraith, Yi-Fu Lai, Cyprien Delpech de Saint Guilhem,
bibinfo, video - One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols,
Christophe Petit, Simon-Philipp Merz, Péter Kutas, Charlotte Weitkämper,
bibinfo, video
- Analysing the HPKE Standard,
- Symmetric Cryptanalysis
- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha,
Murilo Coutinho Silva, Tertuliano C. de Souza Neto,
bibinfo, video - Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette,
Chao Li, Yunwen Liu, Siwei Sun,
bibinfo, video - Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing,
Xiaoyun Wang, Jian Guo, Xiaoyang Dong, Zhenzhen Bao, Siwei Sun, Danping Shi, Zheng Li,
bibinfo, video - A Deeper Look at Machine Learning-Based Cryptanalysis,
Thomas Peyrin, David Gerault, Quan Quan Tan, Adrien Benamira,
bibinfo, video - Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3,
Orr Dunkelman, Nathan Keller, Adi Shamir, Eyal Ronen, Ohad Amon,
bibinfo, video - Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2,
Gaëtan Leurent, Gregor Leander, Håvard Raddum, Patrick Derbez, Christof Beierle, Yann Rotella, David Rupprecht, Lukas Stennes,
bibinfo, video
- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha,
- FHE and IO
- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys,
Jean-Pierre Hubaux, Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza,
bibinfo, video - High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function,
Joseph Lano, Young-Sik Kim, Joon-Woo Lee, Eunsang Lee, Yongwoo Lee,
bibinfo, video - On the Security of Homomorphic Encryption on Approximate Numbers,
Daniele Micciancio, Baiyu Li,
bibinfo, video - The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT,
Claudio Orlandi, Peter Scholl, Sophia Yakoubov,
bibinfo, video - Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification,
Amit Sahai, Huijia Lin, Romain Gay, Aayush Jain,
bibinfo, video - Candidate Obfuscation via Oblivious LWE Sampling,
Hoeteck Wee, Daniel Wichs,
bibinfo, video
- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys,
- Implementation Issues, Masking and Secret Sharing
- Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited,
Guangwu Xu, Wei Yu,
bibinfo, video - Dummy Shuffling against Algebraic Attacks in White-box Implementations,
Alex Biryukov, Aleksei Udovenko,
bibinfo, video - Advanced Lattice Sieving on GPUs, with Tensor Cores,
Marc Stevens, Léo Ducas, Wessel P. J. van Woerden,
bibinfo, video - Fast verification of masking schemes in characteristic two,
Pierre Karpman, Nicolas Bordes,
bibinfo, video - On the Power of Expansion: More Efficient Constructions in the Random Probing Model,
Matthieu Rivain, Sonia Belaïd, Abdul Rahman Taleb,
bibinfo, video - Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages,
Hemanta K. Maji, Anat Paskin-Cherniavsky, Hai H. Nguyen, Mingyuan Wang, Tom Suad,
bibinfo, video
- Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited,
- Invited talk I: A Decade (or So) of Fully Homomorphic Encryption
Craig Gentry - Isogenies and Lattices
- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem,
Michael Naehrig, Craig Costello, Michael Meyer,
bibinfo, video - Delay Encryption,
Luca De Feo, Jeffrey Burdges,
bibinfo, video - A 2n/2-Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP,
Divesh Aggarwal, Noah Stephens-Davidowitz, Zeyong Li,
bibinfo, video - New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts,
Feng-Hao Liu, Zhedong Wang, Qiqi Lai,
bibinfo, video - On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem,
Nadia Heninger, Martin R. Albrecht,
bibinfo - On the ideal shortest vector problem over random rational primes,
Qi Cheng, Jun Xu, Yanbin Pan, Nick Wadleigh,
bibinfo, video
- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem,
- Multiparty Computation
- Order-C Secure Multiparty Computation for Highly Repetitive Circuits,
Abhishek Jain, Aarushi Goel, Gabriel Kaptchuk, Gabrielle Beck,
bibinfo, video - The More The Merrier: Reducing the Cost of Large Scale MPC,
S. Dov Gordon, Arkady Yerukhimovich, Daniel Starin,
bibinfo, video - Multi-Party Reusable Non-Interactive Secure Computation from LWE,
Huijia Lin, Ilan Komargodski, Fabrice Benhamouda, Aayush Jain,
bibinfo, video - Unbounded Multi-Party Computation from Learning with Errors,
Abhishek Jain, Prabhanjan Ananth, Giulio Malavolta, Zhengzhong Jin,
bibinfo, video - Generic Compiler for Publicly Verifiable Covert Multi-Party Computation,
Carmit Hazay, Sebastian Faust, Alexander Schlösser, David Kretzler,
bibinfo, video - Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields,
Antigoni Polychroniadou, Yifan Song,
bibinfo, video
- Order-C Secure Multiparty Computation for Highly Repetitive Circuits,
- Quantum Constructions and Proofs
- Secure Software Leasing,
Prabhanjan Ananth, Rolando L. La Placa,
bibinfo, video - Oblivious Transfer is in MiniQCrypt,
Vinod Vaikuntanathan, Huijia Lin, Fang Song, Alex B. Grilo,
bibinfo, video - Security Analysis of Quantum Lightning,
Bhaskar Roberts,
bibinfo, video - Classical vs Quantum Random Oracles,
Mark Zhandry, Takashi Yamakawa,
bibinfo, video - On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work,
Serge Fehr, Kai-Min Chung, Yu-Hsuan Huang, Tai-Ning Liao,
bibinfo, video - Classical proofs of quantum knowledge,
Thomas Vidick, Tina Zhang,
bibinfo, video
- Secure Software Leasing,
- Invited talk II: An Evolution of Models for Zero-Knowledge Proofs
Sarah Meiklejohn - Symmetric Designs and Leakage-Resilience
- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields,
Christoph Dobraunig, Lorenzo Grassi, Anna Guinet, Daniël Kuijsters,
bibinfo, video - Mind the Middle Layer: The HADES Design Strategy Revisited,
Nathan Keller, Asaf Rosemarin,
bibinfo, video - Password Hashing and Preprocessing,
Stefano Tessaro, Pooya Farshim,
bibinfo, video - Compactness of Hashing Modes and Efficiency beyond Merkle Tree,
Elena Andreeva, Arnab Roy, Rishiraj Bhattacharyya,
bibinfo, video - Leakage Resilient Value Comparison With Application to Message Authentication,
Bart Mennink, Christoph Dobraunig,
bibinfo, video - The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free,
Daniele Venturi, Maciej Obremski, Antonio Faonio, Mark Simkin, Maciej Skórski, João Ribeiro, Gianluca Brian,
bibinfo, video
- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields,
- Post-Quantum Cryptography
- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes,
Bo-Yin Yang, Jintai Ding, Joshua Deaton, Vishakha,
bibinfo, video - Improved cryptanalysis of UOV and Rainbow,
Ward Beullens,
bibinfo, video - Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2),
Itai Dinur,
bibinfo, video - Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions,
Ryo Nishimaki, Shota Yamada, Takashi Yamakawa, Shuichi Katsumata,
bibinfo, video - Post-Quantum Multi-Party Computation,
Vipul Goyal, Dakshita Khurana, Giulio Malavolta, James Bartusek, Amit Agarwal,
bibinfo, video
- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes,
- Zero Knowledge, Property-Preserving Hashing and ORAM
- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers,
Ron D. Rothblum, Prashant Nalini Vasudevan, Inbar Kaslasi,
bibinfo, video - Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments,
Huang Lin, Geoffroy Couteau, Michael Reichle, Michael Klooß,
bibinfo, video - Towards Accountability in CRS Generation,
Vipul Goyal, Gilad Asharov, Prabhanjan Ananth, Hila Dahari,
bibinfo, video - Robust Property-Preserving Hash Functions for Hamming Distance and More,
Nils Fleischhacker, Mark Simkin,
bibinfo, video - Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution,
Rafail Ostrovsky, Brett Hemenway Falk, Daniel Noble,
bibinfo, video - Structured Encryption and Dynamic Leakage Suppression,
Seny Kamara, Tarik Moataz, Marilyn George,
bibinfo, video
- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers,
- Block Chain, Privacy and Law Enforcement
- Dynamic Ad Hoc Clock Synchronization,
Aggelos Kiayias, Alexander Russell, Vassilis Zikas, Peter Gaži, Christian Badertscher,
bibinfo, video - TARDIS: A Foundation of Time-Lock Puzzles in UC,
Jesper Buus Nielsen, Rafael Dowsley, Bernardo David, Carsten Baum, Sabine Oechsner,
bibinfo, video - On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy,
Ravi Kumar, Badih Ghazi, Rasmus Pagh, Ameya Velingker, Noah Golowich,
bibinfo, video - Bifurcated Signatures: Cryptography: Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures,
Benoît Libert, Moti Yung, Thomas Peters, Khoa Nguyen,
bibinfo, video
- Dynamic Ad Hoc Clock Synchronization,
- Multiparty Computation and Garbled Circuits
- Abuse Resistant Law Enforcement Access Systems,
Matthew Green, Gabriel Kaptchuk, Gijs Van Laer,
bibinfo, video - Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN,
Geoffroy Couteau, Pierre Meyer,
bibinfo, video - Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation,
Yuval Ishai, Niv Gilboa, Nishanth Chandran, Elette Boyle, Divya Gupta, N. Nalla Anandakumar, Mayank Rathee,
bibinfo, video - VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE,
Peter Rindal, Phillipp Schoppmann,
bibinfo, video - LogStack: Stacked Garbling with O(b log b) Computation,
Vladimir Kolesnikov, David Heath,
bibinfo, video - Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits,
Nigel P. Smart, Eran Omri, Emmanuela Orsini, Aner Ben-Efraim, Eduardo Soria-Vazquez, Kelong Cong,
bibinfo, video - Threshold Garbled Circuits and Ad Hoc Secure Computation,
Rafail Ostrovsky, Vipul Goyal, Michele Ciampi,
bibinfo, video - Non-Interactive Anonymous Router,
Kaijie Wu, Elaine Shi,
bibinfo, video
- Abuse Resistant Law Enforcement Access Systems,
- Faults, Tampering and Non-Malleability
- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem,
Pierre-Louis Cayrel, Lilian Bossuet, Brice Colombier, Vlad-Florin Dragoi, Alexandre Menu,
bibinfo, video - Multi-Source Non-Malleable Extractors and Applications,
Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu,
bibinfo, video - Black-Box Non-Interactive Non-Malleable Commitments,
Brent Waters, Dakshita Khurana, Rachit Garg, George Lu,
bibinfo, video - Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments,
Dakshita Khurana,
bibinfo, video
- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem,