[Overview] [Day 1] [Day 2] [Day 3]

December 16, 2020

All times are UTC. To convert to your time zone, click [here].
All presentations can be found [here].

11:00 – 12:00 Keynote 4

Session Chair: Haya Shulman

Probabilistic Data Structures in Adversarial Settings
Kenny Paterson
[abstract] [presentation]

12:15 – 12:15 Break

12:15 – 13:30 Session 6: Privacy-Enhancing Tools

Session Chair: Amir Herzberg

Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE
Tapas Pal and Ratna Dutta
[presentation]

Linear Complexity Private Set Intersection for Secure Two-Party Protocols
Ferhat Karakoç and Alptekin Küpçü
[presentation]

Compact Multi-Party Confidential Transactions
Jayamine Alupotha, Xavier Boyen and Ernest Foo
[presentation]

Simulation Extractable Versions of Groth’s zk-SNARK Revisited
Karim Baghery, Zaira Pindado and Carla Ràfols
[presentation]

Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
Bernardo David and Rafael Dowsley
[presentation]

13:30 – 14:15 Lunch break

14:15 – 15:00 Session 7: Lightweight Cryptography

Session Chair: Raphael C.-W. Phan

Integral Cryptanalysis of Reduced-Round Tweakable TWINE
Muhammad ElSheikh and Amr M. Youssef
[presentation] [slides]

RiCaSi: Rigorous Cache Side Channel Mitigation via Selective Circuit Compilation
Heiko Mantel, Lukas Scheidel, Thomas Schneider, Alexandra Weber, Christian Weinert and Tim Weißmantel
[presentation]

Assembly or Optimized C for Lightweight Cryptography on RISC-V
Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Daan Sprenkels and Benoit Viguier
[presentation]

15:00 – 15:15 Break

15:15 – 16:15 Tutorial Part 3

Toward Secure Public Key Infrastructure (PKI): Fixing the Foundations of Applied Cryptography
CA failures and Certificate Transparency
Amir Herzberg
[abstract] [presentation] [slides]

16:15 – 16:30 Break

16:30 – 17:30 Session 8: Codes and Lattices

Session Chair: Simona Samardjiska

Attack on LAC Key Exchange in Misuse Situation
Aurélien Greuet, Simon Montoya and Guénaël Renault
[presentation]

Enhancing Code Based Zero-knowledge Proofs using Rank Metric
Emanuele Bellini, Philippe Gaborit, Alexandros Hasikos and Victor Mateu
[presentation] [slides]

A Secure Algorithm for Rounded Gaussian Sampling
Séamus Brannigan, Maire O’Neill, Ayesha Khalid and Ciara Rafferty
[presentation]

Accelerating Lattice based Proxy Re-Encryption schemes on GPUs
Gyana Sahu and Kurt Rohloff
[presentation]

17:30 – 17:45 Conference Closing

[Overview] [Day 1] [Day 2] [Day 3]