[Overview] [Day 1] [Day 2] [Day 3]
December 16, 2020
All times are UTC. To convert to your time zone, click [here].
All presentations can be found [here].
11:00 – 12:00 Keynote 4
Session Chair: Haya Shulman
Probabilistic Data Structures in Adversarial Settings
Kenny Paterson
[abstract] [presentation]
12:15 – 12:15 Break
12:15 – 13:30 Session 6: Privacy-Enhancing Tools
Session Chair: Amir Herzberg
Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE
Tapas Pal and Ratna Dutta
[presentation]
Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç and Alptekin Küpçü
[presentation]
Compact Multi-Party Confidential Transactions
Jayamine Alupotha, Xavier Boyen and Ernest Foo
[presentation]
Simulation Extractable Versions of Groth’s zk-SNARK Revisited
Karim Baghery, Zaira Pindado and Carla Ràfols
[presentation]
Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
Bernardo David and Rafael Dowsley
[presentation]
13:30 – 14:15 Lunch break
14:15 – 15:00 Session 7: Lightweight Cryptography
Session Chair: Raphael C.-W. Phan
Integral Cryptanalysis of Reduced-Round Tweakable TWINE
Muhammad ElSheikh and Amr M. Youssef
[presentation] [slides]
RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert and Tim Weißmantel
[presentation]
Assembly or Optimized C for Lightweight Cryptography on RISC-V
Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Daan Sprenkels and Benoit Viguier
[presentation]
15:00 – 15:15 Break
15:15 – 16:15 Tutorial Part 3
Toward Secure Public Key Infrastructure (PKI): Fixing the Foundations of Applied Cryptography
CA failures and Certificate Transparency
Amir Herzberg
[abstract] [presentation] [slides]
16:15 – 16:30 Break
16:30 – 17:30 Session 8: Codes and Lattices
Session Chair: Simona Samardjiska
Attack on LAC Key Exchange in Misuse Situation
Aurélien Greuet, Simon Montoya and Guénaël Renault
[presentation]
Enhancing Code Based Zero-knowledge Proofs using Rank Metric
Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos and Victor Mateu
[presentation] [slides]
A Secure Algorithm for Rounded Gaussian Sampling
Séamus Brannigan, Maire O’Neill, Ayesha Khalid and Ciara Rafferty
[presentation]
Accelerating Lattice based Proxy Re-Encryption schemes on GPUs
Gyana Sahu and Kurt Rohloff
[presentation]