08:00 - 17:00 |
Registration |
08:50 - 09:00 |
Opening Remarks |
09:00 - 09:50 |
Technical session 1: Cryptology and Coding Theory
Session Chair: Huaxiong Wang |
|
S1-1 |
Solving LPN Using Covering Codes
Qian Guo; Thomas Johansson; Carl Löndahl |
S1-2 |
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special Form
Jean-Charles Faugère; Ludovic Perret; Frédéric de Portzamparc |
09:50 - 10:40 |
Technical session 2: New Proposals
Session Chair: Serge Vaudenay |
|
S2-1 |
Bivariate Polynomials Modulo Composites and their Applications
Dan Boneh; Henry Corrigan-Gibbs |
S2-2 |
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key
Alex Biryukov; Charles Bouillaguet; Dmitry Khovratovich |
10:40 - 11:10 |
Coffee Break |
11:10 - 12:25 |
Technical session 3: Authenticated Encryption
Session Chair: Thomas Peyrin |
|
S3-1 |
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
Philipp Jovanovic; Atul Luykx; Bart Mennink |
S3-2 |
How to Securely Release Unverified Plaintext in Authenticated Encryption
Elena Andreeva; Andrey Bogdanov; Atul Luykx; Bart Mennink; Nicky Mouha; Kan Yasuda |
S3-3 |
Forging Attacks on two Authenticated Encryption Schemes COBRA and POET
Mridul Nandi |
12:25 - 14:00 |
Lunch @ Market Café, 1F |
14:00 - 15:40 |
Technical session 4: Symmetric Key Cryptanalysis
Session Chair: Itai Dinur |
|
S4-1 |
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128
Sareh Emami; San Ling; Ivica Nikolić; Josef Pieprzyk; Huaxiong Wang |
S4-2 |
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers
Siwei Sun; Lei Hu; Peng Wang; Kexin Qiao; Xiaoshuang Ma; Ling Song |
S4-3 |
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon
Christina Boura; María Naya-Plasencia; Valentin Suder |
S4-4 |
A Simplified Representation of AES
Henri Gilbert |
15:40 - 16:10 |
Coffee Break |
16:10 - 17:50 |
Technical session 5: Side Channel Analysis I
Session Chair: Mitsuru Matsui |
|
S5-1 |
Simulatable Leakage: Analysis, Pitfalls, and new Constructions
Jake Longo; Daniel P. Martin; Elisabeth Oswald; Daniel Page; Martijn Stam; Michael J. Tunstall |
S5-2 |
Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer
Luke Mather; Elisabeth Oswald; Carolyn Whitnall |
S5-3 |
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures With Single-Bit Nonce Bias
Diego F. Aranha; Pierre-Alain Fouque; Benoît Gérard; Jean-Gabriel Kammerer; Mehdi Tibouchi; Jean-Christophe Zapalowicz |
S5-4 |
Soft Analytical Side-Channel Attacks
Nicolas Veyrat-Charvillon; Benoît Gérard; François-Xavier Standaert |
18:00 - 20:00 |
AsiaCrypt Steering Committee Meeting @ Union Hall, 2F |
08:00 - 17:00 |
Registration |
09:00 - 10:15 |
Technical session 6: Hyperelliptic Curve Cryptography
Session Chair: Steven Galbraith |
|
S6-1 |
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
Christophe Doche |
S6-2 |
Kummer strikes back: new DH speed records
Daniel J. Bernstein; Chitchanok Chuengsatiansup; Tanja Lange; Peter Schwabe |
S6-3 |
Jacobian Coordinates on Genus 2 Curves
Huseyin Hisil; Craig Costello |
10:15 - 11:05 |
Technical session 7: Factoring and Discrete Log
Session Chair: Tanja Lange |
|
S7-1 |
Mersenne factorization factory
Thorsten Kleinjung; Joppe W. Bos; Arjen K. Lenstra |
S7-2 |
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields
Antoine Joux; Cécile Pierrot |
11:05 - 11:35 |
Coffee Break |
11:35 - 12:35 |
Technical session 8: Invited Talk I
Session Chair: Tetsu Iwata |
Big Bias Hunting in Amazonia: Large-scale Computation and Exploitation of RC4 Biases
Kenneth G. Paterson |
12:35 - 14:00 |
Lunch @ Top of Ambassador, 20F |
14:00 - 15:40 |
Technical session 9: Cryptanalysis
Session Chair: Xuejia Lai |
|
S9-1 |
Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE
Pierre-Alain Fouque; Antoine Joux; Chrysanthi Mavromati |
S9-2 |
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys
Itai Dinur; Orr Dunkelman; Nathan Keller; Adi Shamir |
S9-3 |
Meet-in-the-Middle Attacks on Generic Feistel Constructions
Jian Guo; Jérémy Jean; Ivica Nikolić; Yu Sasaki |
S9-4 |
XLS is not a Strong Pseudorandom Permutation
Mridul Nandi |
15:40 - 16:10 |
Coffee Break |
16:10 - 17:00 |
Technical session 10: Signatures
Session Chair: Mehdi Tibouchi |
|
S10-1 |
Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials
Christian Hanser; Daniel Slamanig |
S10-2 |
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker; Tibor Jager; Dominique Schröder |
17:00 - 17:50 |
Technical session 11: Zero-Knowledge
Session Chair: Eiichiro Fujisaki |
|
S11-1 |
Square Span Programs with Applications to Succinct NIZK Arguments
George Danezis; Cédric Fournet; Jens Groth; Markulf Kohlweiss |
S11-2 |
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
Fabrice Benhamouda; Jan Camenisch; Stephan Krenn; Vadim Lyubashevsky; Gregory Neven |
19:30 - 21:30 |
Rump Session |
08:00 - 17:00 |
Registration |
09:00 - 10:15 |
Technical session 12: Encryption Schemes
Session Chair: Duong-Hieu Phan |
|
S12-1 |
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
Benoît Libert; Marc Joye; Moti Yung; Thomas Peters |
S12-2 |
Efficient Identity-Based Encryption over NTRU Lattices
Léo Ducas; Vadim Lyubashevsky; Thomas Prest |
S12-3 |
Order-Preserving Encryption Secure Beyond One-Wayness
Isamu Teranishi; Moti Yung; Tal Malkin |
10:15 - 11:05 |
Technical session 13: Outsourcing and Delegation
Session Chair: Hugo Krawczyk |
|
S13-1 |
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead
Kai-Min Chung; Zhenming Liu; Rafael Pass |
S13-2 |
Adaptive Security of Constrained PRFs
Georg Fuchsbauer; Momchil Konstantinov; Krzysztof Pietrzak; Vanishree Rao |
11:05 - 11:35 |
Coffee Break |
11:35 - 12:35 |
Technical session 14: Invited Talk II
Session Chair: Palash Sarkar |
The Legal Infrastructure Around Information Security in Asia
Helaine Leggat |
12:35 - 14:00 |
Lunch @ Market Café, 1F |
14:00 - 15:40 |
Technical session 15: Obfuscation
Session Chair: Jens Groth |
|
S15-1 |
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
Mihir Bellare; Igors Stepanovs; Stefano Tessaro |
S15-2 |
Using Indistinguishability Obfuscation via UCEs
Christina Brzuska; Arno Mittelbach |
S15-3 |
Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input
Christina Brzuska; Arno Mittelbach |
S15-4 |
Bootstrapping Obfuscators via Fast Pseudorandom Functions
Benny Applebaum |
15:40 - 16:10 |
Coffee Break |
16:10 - 17:25 |
Technical session 16: Homomorphic Cryptography
Session Chair: Sherman S.M. Chow |
|
S16-1 |
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
Chihong Joo; Aaram Yun |
S16-2 |
Authenticating Computation on Groups: New Homomorphic Primitives and Applications
Dario Catalano; Antonio Marcedone; Orazio Puglisi
|
S16-3 |
Compact VSS and Efficient Homomorphic UC Commitments
Ivan Damgård; Bernardo David; Irene Giacomelli; Jesper Buus Nielsen |
17:30 –18:30 |
IACR Membership Meeting |
19:30 - 22:00 |
Banquet @ International Hall, 2F |
08:00 - 17:00 |
Registration |
09:00 - 09:50 |
Technical session 17: Secret Sharing
Session Chair: Moti Yung |
|
S17-1 |
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model
Stanislaw Jarecki; Aggelos Kiayias; Hugo Krawczyk |
S17-2 |
Secret-Sharing for NP
Ilan Komargodski; Moni Naor; Eylon Yogev |
09:50 - 10:40 |
Technical session 18: Block Ciphers and Passwords
Session Chair: Christina Boura |
|
S18-1 |
Tweaks and Keys for Block Ciphers: the TWEAKEY Framework
Jérémy Jean; Ivica Nikolić; Thomas Peyrin |
S18-2 |
Memory-Demanding Password Scrambling
Christian Forler; Stefan Lucks; Jakob Wenzel |
10:40 - 11:10 |
Coffee Break |
11:10 - 12:25 |
Technical session 19: Side Channel Analysis II
Session Chair: Marc Stevens |
|
S19-1 |
Side-Channel Analysis of Multiplications in $GF(2^{128})$: Application to AES-GCM
Sonia Belaïd; Pierre-Alain Fouque; Benoît Gérard |
S19-2 |
Higher-Order Threshold Implementations
Begül Bilgin; Benedikt Gierlichs; Svetla Nikova; Ventzislav Nikov; Vincent Rijmen |
S19-3 |
Masks will Fall Off: Higher-Order Optimal Distinguishers
Nicolas Bruneau; Sylvain Guilley; Annelie Heuser; Olivier Rioul |
12:25 - 14:00 |
Lunch @ Top of Ambassador, 20F |
14:00 - 14:50 |
Technical session 20: Black-Box Separation
Session Chair: Kai-Min Chung |
|
S20-1 |
Black-Box Separations for One-More (Static) CDH and Its Generalization
Jiang Zhang; Zhenfeng Zhang; Yu Chen; Yanfei Guo; Zongyang Zhang |
S20-2 |
Black-Box Separations for Differentially Private Protocols
Dakshita Khurana; Hemanta K. Maji; Amit Sahai |
14:50 - 15:40 |
Technical session 21: Composability
Session Chair: Benoit Libert |
|
S21-1 |
Composable Security of Delegated Quantum Computation
Vedran Dunjko; Joseph F. Fitzsimons; Christopher Portmann; Renato Renner |
S21-2 |
All-But-Many Encryption: A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
|
15:40 - 16:10 |
Coffee Break |
16:10 - 17:50 |
Technical session 22: Multi-Party Computation
Session Chair: Josef Pieprzyk |
|
S22-1 |
Multi-Valued Byzantine Broadcast: the t < n Case
Martin Hirt; Pavel Raykov |
S22-2 |
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation
Ran Cohen; Yehuda Lindell |
S22-3 |
Actively Secure Private Function Evaluation
Payman Mohassel; Saeed Sadeghian; Nigel P. Smart |
S22-4 |
Efficient, Oblivious Data Structures for MPC
Marcel Keller; Peter Scholl |