Selected Areas in Cryptography 2020
cryptography and security
Audience: | Researchers in the discipline |
Conference dates: | 21-Oct-2020 to 23-Oct-2020 |
Organizers: | Colin O'Flynn*, Orr Dunkelman, Michael Jacobson, Jr.* |
*contact for this listing |
See the conference web page for more information about the program, registration, etc.
Upcoming talks
Past talks
Your time | Speaker | Title | |||
---|---|---|---|---|---|
Fri | Oct 23 | 16:30 | SAC Program Chairs | Concluding Remarks | |
Fri | Oct 23 | 16:00 | Previous Speakers | Discussion | |
Fri | Oct 23 | 15:55 | Bor de Kock, Kristian Gjøsteen, Mattia Veroni | Practical Isogeny-Based Key-exchange with Optimal Tightness | |
Fri | Oct 23 | 15:50 | Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit | On Index Calculus Algorithms for Subfield Curves | |
Fri | Oct 23 | 15:45 | Péter Kutas, Christophe Petit, Javier Silva | Trapdoor DDH groups from pairings and isogenies | |
Fri | Oct 23 | 15:40 | Sean Murphy, Maura Paterson, Christine Swart | Boolean Ring Cryptographic Equation Solving | |
Fri | Oct 23 | 15:35 | Chelsea Komlo, Ian Goldberg | FROST: Flexible Round-Optimized Schnorr Threshold Signatures | |
Fri | Oct 23 | 15:30 | Ward Beullens | Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$ | |
Fri | Oct 23 | 15:29 | Jean-François Biasse (Session Chair) | Session 6: Public-Key 2 | |
Fri | Oct 23 | 14:00 | Benjamin Smith (Invited Talk) | Trustless groups of unknown order | |
Thu | Oct 22 | 15:50 | Previous Speakers | Discussion | |
Thu | Oct 22 | 15:45 | Hao Cheng, Johann Groszschaedl, Jiaqi Tian, Peter B. Roenne, Peter Y. A. Ryan | High-Throughput Elliptic Curve Cryptography using AVX2 Vector Instructions | |
Thu | Oct 22 | 15:40 | Guilherme Perin, Stjepan Picek | On the Influence of Optimizers in Deep Learning-based Side-Channel Analysis | |
Thu | Oct 22 | 15:35 | Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric | Correlation Power Analysis and Higher-order Masking Implementation of WAGE | |
Thu | Oct 22 | 15:30 | Aron Gohr, Sven Jacob, Werner Schindler | Subsampling and Knowledge Distillation On Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations | |
Thu | Oct 22 | 15:29 | Francisco Rodríguez-Henríquez (Session Chair) | Session 5: Hardware | |
Thu | Oct 22 | 14:30 | Previous Speakers | Discussion | |
Thu | Oct 22 | 14:25 | Arnab Roy, Elena Andreeva, Ferdinand Sauer | Interpolation Cryptanalysis of UFNs with Low Degree Round Functions | |
Thu | Oct 22 | 14:20 | Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri | WARP: Revisiting GFN for Lightweight 128-bit Block Cipher | |
Thu | Oct 22 | 14:15 | John-Petter Indrøy, Nicolas Costes, Håvard Raddum | Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath | |
Thu | Oct 22 | 14:10 | Fulei Ji, Zhang Wentao, Chunning Zhou, Tianyou Ding | Improved (Related-key) Differential Cryptanalysis on GIFT | |
Thu | Oct 22 | 14:05 | Tingting Cui, Lorenzo Grassi | Algebraic Key-Recovery Attacks on Reduced-Round Xoofff | |
Thu | Oct 22 | 14:00 | Lorenzo Grassi, Gregor Leander, Christian Rechberger, Cihangir Tezcan, Friedrich Wiemer | Weak-Key Distinguishers for AES | |
Thu | Oct 22 | 13:59 | Maria Eichlseder (Session Chair) | Session 4: Symmetric-Key 2 | |
Thu | Oct 22 | 01:50 | Previous Speakers | Discussion | |
Thu | Oct 22 | 01:35 | Steven D. Galbraith, Lukas Zobernig | Obfuscating Finite Automata | |
Thu | Oct 22 | 01:30 | Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu | Efficient Lattice-Based Polynomial Evaluation and Batch Zero-Knowledge Arguments | |
Thu | Oct 22 | 01:29 | Marcel Keller (Session Chair) | Session 3: Public-Key 1 | |
Thu | Oct 22 | 00:00 | Vanessa Teague (Stafford Tavares Lecture) | What’s so hard about Internet voting? | |
Wed | Oct 21 | 15:50 | Previous Speakers | Discussion | |
Wed | Oct 21 | 15:45 | Jacqueline Brendel, Marc Fischlin, Felix Günther, Christian Janson, Douglas Stebila | Towards Post-Quantum Security for Signal’s X3DH Handshake | |
Wed | Oct 21 | 15:40 | Jonathan Satoshi Takeshita, Dayane Reis, Ting Gong, Michael Niemier, X. Sharon Hu, Taeho Jung | Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM | |
Wed | Oct 21 | 15:35 | Ashley Fraser, Elizabeth A. Quaglia | Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting | |
Wed | Oct 21 | 15:30 | Adrián Ranea, Bart Preneel | On Self-Equivalence Encodings in White-Box Implementations | |
Wed | Oct 21 | 15:29 | Riham AlTawy (Session Chair) | Session 2: Applications | |
Wed | Oct 21 | 14:35 | Previous Speakers | Discussion | |
Wed | Oct 21 | 14:30 | Gal Benmocha, Eli Biham, and Stav Perle | Unintended Features of APIs: Cryptanalysis of Incremental HMAC | |
Wed | Oct 21 | 14:25 | James H. Davenport and Benjamin Pring | Improvements to quantum search techniques for block-ciphers, with applications to AES | |
Wed | Oct 21 | 14:20 | Samuel Jaques and André Schrottenloher | Low-gate Quantum Golden Collision Finding | |
Wed | Oct 21 | 14:15 | Elena Andreeva, Amit Singh Bhati, Damian Vizár | Nonce-Misuse Security of the SAEF Authenticated Encryption Mode | |
Wed | Oct 21 | 14:10 | Dušan Božilov, Maria Eichlseder, Miroslav Knežević, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer | PRINCEv2: More Security for (Almost) No Overhead | |
Wed | Oct 21 | 14:09 | Session 1: Symmetric Key 1 | Session 1: Symmetric Key 1 | |
Wed | Oct 21 | 14:00 | SAC Program Chairs | SAC2020 Introduction & Kick-Off |
Export series to