Technical Program > Accepted Papers

Accepted Papers

1
Simultaneously simple universal and indifferentiable hashing to elliptic curves
Dimitri Koshelev
University of Lleida, Catalonia, Spain
2
An Improvement of the Congruence Solver of Lattice Isomorphism Problem over Totally Real Number Fields and Applications
Nour-eddine Rahmani, Taoufik Serraj, Moulay Chrif Ismaili
Mohammed I University, Oujda, Morocco
3
A New Generalized Attack on RSA-like Cryptosystems
Michel SECK, Oumar Niang, Djiby Sow, Abderrahmane Nitaj, Mengce Zheng, Maher Boudabra
Ecole Polytechnique de Thies, Senegal; UCAD Dakar, Senegal; University of Caen Normandie, France; Zhejiang Wanli University Ningbo, China; KFUPM Dhahran, Saudi Arabia
4
FPTRU: Optimization of NTRU-Prime and TLS Performance Assessment
Xiaowen Hu, Hanyu Wei, Hengchuan Zou, Zhichuang Liang, Wenqian Li, Yunlei Zhao
Fudan University, Shanghai, China; State Key Laboratory of Cryptology, Beijing, China
5
Simple Power Analysis Attack on SQIsign
Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy
Graz University of Technology, Austria; Eötvös Loránd University, Hungary; University of Birmingham, England
6
Activate Me!: Designing Efficient Activation Functions for Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
Nges Brian Njungle, Michel A. Kinsy
Arizona State University, USA
7
Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography
Solane El Hirch, Christine van Vredendaal, Frank Custers
Radboud University Nijmegen, The Netherlands; NXP Semiconductors Eindhoven, The Netherlands
8
Bivariate proximity test-based Asynchronous Verifiable Secret Sharing
Lola-Baie Mallordy, Olivier Blazy, Daniel Augot, Hugo Delavenne
LIX, Ecole Polytechnique, Institut Polytechnique de Paris, Inria, France
9
Attribute-based Encryption using Sum-Product Decomposition of Boolean Functions
Arani Raychaudhuri, Ramprasad Sarkar, Mriganka Mandal
Indian Statistical Institute Kolkata, India
10
Correlation power analysis of LESS and CROSS
Maciej Czuprynko, Anisha Mukherjee, Sujoy Sinha Roy
ISEC, Graz University of Technology, Austria
11
Convolution-Friendly Image Compression with FHE
Georgio Nicolas, Sergi Rovira, Axel Mertens
COSIC, KU Leuven, Belgium; Technology Innovation Institute, UAE
12
One-Way Homomorphic Encryption: A Composite Group Approach
Mahdi Mahdavi, Helena Rifà-Pous
Universitat Oberta de Catalunya, Spain; Shahid Beheshti University, Iran
13
PMNS arithmetic for elliptic curve cryptography
Fangan Yssouf Dosso, Sylvain Duquesne, Nadia EL Mrabet, Emma Gautier
École des Mines de Saint-Étienne, France; University of Rennes, France
14
Constant-time Integer Arithmetic for SQIsign
Fatna Kouider, David Jacquemin, Anisha Mukherjee, Peter Kutas
Eötvös Loránd University, Hungary; ISEC, Graz University of Technology, Austria; University of Birmingham, United Kingdom
15
A Novel Partial Key Exposure Attack on Common Prime RSA
Mengce Zheng, Abderrahmane Nitaj
Zhejiang Wanli University, China; University of Caen Normandie, France
16
Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve
Mohammed Rahmani, Abderrahmane Nitaj
Mohammed First University, Oujda, Morocco; University of Caen Normandie, France
17
Efficient and Optimized Modeling of S-Boxes
Anirudh Aitipamula, Debranjan Pal, Dipanwita Roy Chowdhury
Indian Institute of Technology Kharagpur, India; Indian Institute of Technology Kanpur, India
18
Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE
Bibhas Chandra
Institute for Advancing Intelligence TCG CREST, India; Chennai Mathematical Institute, India
19
TPL: Power Leakage Model Based on Technology Library
Sumesh Manjunath, Hoda Alkhzaimi
New York University Abu Dhabi, UAE
20
Behemoth: transparent polynomial commitment scheme with constant opening proof size and verifier time
Istvan Seres, Péter Burcsi
Eötvös Loránd University, Hungary
21
Leveled Homomorphic Encryption over Composite Groups
Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi
Universitat Oberta de Catalunya, Spain; University of Delaware, USA; COSIC, KU Leuven, Belgium & Nokia Bell Labs; University of Hamburg, Germany
Loading... Loading...