Accepted Papers

Side-channel analysis

  • Virtual Security Evaluation Youssef Souissi, Adrien Facon and Sylvain Guilley
  • Cache-Timing Attacks still threaten IoT devices Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi and Yves Matthieu
  • Speed-up of SCA attacks on 32-bit multiplications Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier and Safwan Elassad
  • Cryptography

  • Arabic Cryptography and Steganography in Morocco (Invited Talk) Abdelmalek Azizi
  • An AEAD variant of the Grain stream cipher (Invited Talk) Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup and Hirotaka Yoshida
  • Construction for a Nominative Signature Scheme from Lattice with Enhanced Security Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay
  • Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG George Teşeleanu
  • A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem Jintai Ding, Kevin Schmitt and Zheng Zhang
  • Non-Interactive Zero Knowledge Proofs in the Random Oracle Model Vincenzo Iovino and Ivan Visconti
  • From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He and Siu-Ming Yiu
  • Secret sharing

  • Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments Matthias Geihs, Lucas Schabhëser and Johannes Buchmann
  • Secret Sharing using Near-MDS Codes Sanyam Mehta, Vishal Saraswat and Smith Sen
  • Mathematics for cryptography

  • On Plateaued Functions, Linear Structures and Permutation Polynomials Sihem Mesnager, Kübra Kaytanci and Ferruh Özbudak
  • Faster Scalar Multiplication on the $x$-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains Hairong Yi, Guiwen Luo and Dongdai Lin
  • Codes and their applications

  • On good polynomials over finite fields for optimal locally recoverable codes (Invited Talk) Sihem Mesnager
  • A New Gabidulin-like Code and its Application in Cryptography Terry Shue Chien Lau and Chik How Tan
  • Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum $\pi$-distance 3 Soukaina Belabssir, Edoukou Berenger Ayebie and El Mamoun Souidi
  • Quasi-Dyadic Girault Identification Scheme Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione and Jean Belo Klamti
  • Homomorphic encryption

  • Securely aggregating testimonies with Threshold Multi-key FHE Gerald Gavin, Stephane Bonnevay
  • Improved Efficiency of a Linearly Homomorphic Cryptosystem Parthasarathi Das, Michael J. Jacobson, Jr. and Renate Scheidler
  • Applied cryptography

  • On the Tracing Traitors Math (Invited Talk), Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing Grigory Kabatiansky
  • Privacy Preserving Auctions on top of Ethereum (Invited Talk) Amr M. Youssef
  • Reusable Garbled Turing Machines without FHE Yongge Wang and Qutaibah M. Malluhi
  • An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness Jingchen Yan, Yating Wang, Yuichi Goto and Jingde Cheng
  • A Practical and Insider Secure Signcryption with Non--Interactive Non--Repudiation Augustin P. Sarr , Papa B. Seye , TogdĂ© Ngarenon
  • Security

  • Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems (Invited Talk) Said El Hajji, Nabil Moukafih and Ghizlane Orhanou
  • Managing Your Kleptographic Subscription Plan George Teşeleanu
  • Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification Gianpiero Cabodi, Paolo Camurati, Fabrizio Finocchiaro and Danilo Vendraminetto



  • Sponsors