Selected Areas in Cryptography 2021
cryptography and security
Audience: | Researchers in the topic |
Conference dates: | 29-Sep-2021 to 01-Oct-2021 |
Organizers: | Riham AlTawy*, Andreas Hülsing |
*contact for this listing |
Upcoming talks
Past talks
Your time | Speaker | Title | |||
---|---|---|---|---|---|
Fri | Oct 01 | 17:00 | SAC Chairs | Concluding Remarks | |
Fri | Oct 01 | 16:50 | Previous Speakers | Session Question Period | |
Fri | Oct 01 | 16:45 | Robin Jadoul, Nigel Smart and Barry Van Leeuwen | MPC for $Q_2$ Access Structures over Rings and Fields | |
Fri | Oct 01 | 16:40 | Animesh Roy, Dibyendu Roy and Subhamoy Maitra | How do the Arbiter PUFs Sample the Boolean Function Class? | |
Fri | Oct 01 | 16:35 | Siemen Dhooghe, Tim Beyne, Adrián Ranea and Danilo Šijačić | A Low-Randomness Second-Order Masked AES | |
Fri | Oct 01 | 16:34 | Benjamin Smith (Session Chair) | Session 6: Privacy and Applications 2 | |
Fri | Oct 01 | 16:20 | Previous Speakers | Session Question Period | |
Fri | Oct 01 | 16:15 | Armando Faz-Hernandez, Watson Ladd and Deepak Maram | ZKAttest: Ring and Group Signatures for existing ECDSA keys | |
Fri | Oct 01 | 16:10 | Keita Xagawa | The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application | |
Fri | Oct 01 | 16:05 | Deepak Kumaraswamy, Shyam Murthy and Srinivas Vivek | Revisiting Driver Anonymity in ORide | |
Fri | Oct 01 | 16:00 | Alessandro Melloni, Martijn Stam and Øyvind Ytrehus | On evaluating anonymity of Onion routing | |
Fri | Oct 01 | 15:59 | Elizabeth Quaglia (Session Chair) | Session 5: Privacy and Applications 1 | |
Thu | Sep 30 | 17:25 | Eyal Ronen (Invited Talk) | Privacy-Preserving Bluetooth Based Contact Tracing --- One Size Does Not Fit All | |
Thu | Sep 30 | 17:15 | Break | Break | |
Thu | Sep 30 | 17:00 | Previous Speakers | Session Question Period | |
Thu | Sep 30 | 16:55 | Edward Eaton, David Jao, Chelsea Komlo and Youcef Mokrani | Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies | |
Thu | Sep 30 | 16:50 | Jorge Chavez-Saab, Francisco Rodríguez-Henríquez and Mehdi Tibouchi | Verifiable Isogeny Walks: Towards an Isogeny-based Postquantum VDF | |
Thu | Sep 30 | 16:45 | Sabrina Kunzweiler, Yan Bo Ti and Charlotte Weitkämper | Secret Keys in Genus-2 SIDH | |
Thu | Sep 30 | 16:40 | Paul Frixons, María Naya-Plasencia and André Schrottenloher | Quantum Boomerang Attacks and Some Applications. | |
Thu | Sep 30 | 16:35 | André Schrottenloher | Improved Quantum Algorithms for the k-XOR Problem | |
Thu | Sep 30 | 16:34 | Péter Kutas (Session Chair) | Session 4: Post-quantum crypto 2 | |
Thu | Sep 30 | 16:20 | Previous Speakers | Session Question Period | |
Thu | Sep 30 | 16:15 | Pierre Briaud, Javier Verbel and Jean-Pierre Tillich. | A polynomial time key-recovery attack on the Sidon cryptosystem | |
Thu | Sep 30 | 16:10 | Parhat Abla and Mingsheng Wang | Zaytun: Lattice based PKE and KEM with Shorter Ciphertext Size | |
Thu | Sep 30 | 16:05 | Haruhisa Kosuge and Hidema Tanaka | Simple and Memory-efficient Signature Generation of XMSS^MT | |
Thu | Sep 30 | 16:00 | Ward Beullens | MAYO: Practical Post-Quantum Signatures from Oil-and-Vinegar Maps | |
Thu | Sep 30 | 15:59 | Simona Samardjiska (Session Chair) | Session 3: Post-quantum crypto 1 | |
Wed | Sep 29 | 18:20 | Social event | Social event on wonder.me | |
Wed | Sep 29 | 17:20 | Sofía Celi (Stafford Tavares Lecture) | How private is secure messaging? | |
Wed | Sep 29 | 17:10 | Break | Break | |
Wed | Sep 29 | 16:55 | Previous Speakers | Session Question Period | |
Wed | Sep 29 | 16:50 | Alex Biryukov, Luan Cardoso dos Santos, Daniel Feher, Vesselin Velichkov and Giuseppe Vitto. | Automated Truncation of Differential Trails and Trail Clustering in ARX | |
Wed | Sep 29 | 16:45 | Stephanie Delaune, Patrick Derbez, Arthur Gontier and Charles Prud'Homme. | A Simpler Model for Recovering Superpoly on Trivium. | |
Wed | Sep 29 | 16:40 | Ling Sun, Wei Wang and Meiqin Wang. | Improved Attacks on GIFT-64 | |
Wed | Sep 29 | 16:35 | Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang and Siu-Ming Yiu | Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES | |
Wed | Sep 29 | 16:34 | Yosuke Todo (Session Chair) | Session 2: Symmetric key crypto 2 | |
Wed | Sep 29 | 16:25 | Previous Speakers | Session Question Period | |
Wed | Sep 29 | 16:20 | Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri and Hiroyasu Kubo | Parallel Verification of Serial MAC and AE Modes | |
Wed | Sep 29 | 16:15 | Yosuke Todo and Yu Sasaki | Designing S-boxes Providing Stronger Security against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR | |
Wed | Sep 29 | 16:10 | Tim Beyne, Yu Long Chen, Christoph Dobraunig and Bart Mennink | Multi-User Security of the Elephant v2 Authenticated Encryption Mode | |
Wed | Sep 29 | 16:09 | Kalikinkar Mandal (Session Chair) | Session 1: Symmetric key crypto 1 | |
Wed | Sep 29 | 16:00 | SAC Program Chairs | SAC Introduction |
Export series to