Accepted Papers
- A note on Ring-LWE security in the case of Fully Homomorphic Encryption
Guillaume Bonnoron; Caroline Fontaine
Chair of Naval Cyber Defence; CNRS and IMT Atlantique
- Architecture level Optimizations for Kummer based HECC on FPGAs
Gabriel Gallin; Turku Ozlum Celik; Arnaud Tisserand
INRIA Rennes and University Rennes 1; University Rennes 1; CNRS and University South Brittany
- Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round
Alexandre Adomnicai; Jacques J. A. Fournier; Laurent Masson
Trusted Objects, ENSM-SE; CEA-Leti; Trusted Objects
- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Sanjit Chatterjee; Sayantan Mukherjee; Tapas Pandit
Indian Institute of Science, Bangalore; Indian Institute of Science, Bangalore; Indian Institute of Science, Bangalore
- Cold Boot Attacks on NTRU
Kenneth G. Paterson; Ricardo Villanueva-Polanco
Royal Holloway, University of London; Royal Holloway, University of London
- Differential Cryptanalysis of 18-Round PRIDE
Virginie Lallemand; Shahram Rasoolzadeh
Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany; Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
- DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates
Jiji Angel; Rahul R; Ashokkumar C; Bernard Menezes
Indian Institute of Technology Bombay; Indian Institute of Technology Bombay; Indian Institute of Technology Bombay; Indian Institute of Technology Bombay
- Efficient Construction of Diamond Structures
Ariel Weizmann; Orr Dunkelman; Simi Haber
Bar Ilan University, Israel; University of Haifa, Israel; Bar Ilan University, Israel
- Efficient Optimal Ate Pairing at 128-bit Security Level
Md. Al-Amin Khandaker; Yuki Nanjo; Loubna Ghammam; Yasuyuki Nogami; Yuta Kodera; Sylvain Duquesne
Okayama University; Okayama University; Normandie University; Okayama University; Okayama University; University of Rennes 1.
- Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
Saud A. Al Musa; Guangwu Xu
University of Wisconsin-Milwaukee; University of Wisconsin-Milwaukee
- Field lifting for smaller UOV public keys
Ward Beullens; Bart Preneel
imec-COSIC KU Leuven; imec-COSIC KU Leuven
- Gabidulin matrix codes and their application to small ciphertext size cryptosystems
Thierry P. Berger; Philippe Gaborit; Olivier Ruatta
CNRS and University of Limoges; CNRS and University of Limoges; CNRS and University of Limoges.
- Lightweight Design Choices for LED-like Block Ciphers
Sumanta Sarkar; Habeeb Syed; Rajat Sadhukhan; Debdeep Mukhopadhyay
TCS Innovation Labs, Hyderabad; TCS Innovation Labs, Hyderabad; Indian Institute of Technology, Kharagpur; Indian Institute of Technology, Kharagpur
- Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
Mustafa Khairallah; Anupam Chattopadhyay; Thomas Peyrin
NTU, Singapore; NTU, Singapore; NTU, Singapore
- Improved Differential Cryptanalysis on Generalized Feistel Schemes Ivan Tjuawinata; Tao Huang; Hongjun Wu
Nanyang Technological University; Nanyang Technological University; Nanyang Technological University
- Improvements for Gate-Hiding Garbled Circuits
Mike Rosulek
Oregon State University
- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor palpha qbeta
Patrick Holzer; Thomas Wunderer; Johannes A. Buchmann
TU Darmstadt; TU Darmstadt; TU Darmstadt
- Revisiting a Masked Lookup-Table Compression Scheme
Srinivas Vivek
University of Bristol, UK
- Several Masked Implementations of the Boyar-Peralta AES S-Box
Ashrujit Ghoshal; Thomas De Cnudde
Indian Institute of Technology, Kharagpur; KU Leuven, ESAT-COSIC and imec, Belgium