QA-NIZK Arguments of Same Opening
for Bilateral Commitments [Slides]
Carla Ràfols and
Javier Silva
Signatures
of Knowledge for Boolean Circuits Under Standard Assumptions [Slides]
Karim Baghery, Alonso González, Zaira
Pindado, and Carla Ràfols
LESS is More: Code-Based Signatures Without Syndromes [Slides]
Jean-François Biasse, Giacomo Micheli, Edoardo Persichetti, and Paolo Santini
UC Updatable Databases and Applications [Slides]
Aditya Damodaran and Alfredo
Rial
Impossible
Differential Cryptanalysis of Reduced-Round Tweakable TWINE [Slides]
Mohamed Tolba, Muhammad
ElSheikh, and Amr M. Youssef
MixColumns
Coefficient Property and Security of the AES with
A Secret S-Box [Slides]
Xin An, Kai Hu, and Meiqin
Wang
New Results on the SymSum Distinguisher on Round-Reduced SHA3 [Slides]
Sahiba Suryawanshi, Dhiman
Saha, and Satyam Sachan
Cryptanalysis of FLEXAEAD [Slides]
Mostafizar Rahman, Dhiman
Saha, and Goutam Paul
BBB Secure Nonce Based MAC Using Public Permutations [Slides] [Video]
Avijit Dutta and Mridul
Nandi
On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol [Slides]
Andrea Basso, Péter Kutas, Simon-Philipp Merz, Christophe Petit, and Charlotte Weitkämper
Monika Trimoska, Sorina
Ionica, and Gilles Dequen
Hash-Based
Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security [Slides]
Mahmoud Yehia, Riham AlTawy,
and T. Aaron Gulliver
LMS vs
XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4 [Slides]
Fabio Campos, Tim Kohlstadt,
Steffen Reith, and Marc Stöttinger
Meenakshi Kansal and Ratna
Dutta
Sieve,
Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP [Slides]
Emmanouil Doulgerakis, Thijs
Laarhoven, and Benne de Weger
Online Template Attack on ECDSA: Extracting Keys via the Other Side [Slides]
Niels Roelofs, Niels Samwel,
Lejla Batina, and Joan Daemen
When
Similarities Among Devices Are Taken for Granted: Another Look at Portability [Slides] [Video]
Unai Rioja, Lejla Batina,
and Igor Armendariz
A Tale of Three Signatures: Practical Attack of ECDSA with wNAF [Slides] [Video]
Gabrielle De Micheli, Rémi Piau, and Cécile Pierrot
Attacking RSA Using an Arbitrary Parameter [Slides]
Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar and
Muhammad Asyraf Asbullah
A New
Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder [Slides]
New Ideas to Build Noise-Free Homomorphic Schemes [Slides]
Gerald Gavin and
Sandrine Tainturie