Program
Date: 11/12/2022
- [08:30 – 09:30] – Registration
- [09:30 – 11:00] – Inauguration [by Dr. Purnendu Chatterjee]
- [11:00 – 12:30] – Tutorial Talk – Santanu Sarkar [Talk Title: Lattice-based attacks on RSA] [Abstract]
- [14:00 – 15:30] – Tutorial Talk – Mridul Nandi [Talk Title: Distinguishing Attacks on Symmetric Key Designs] [Abstract]
- [15:30 – 17:00] – Tutorial Talk – Patrick Derbez [Tools and Algorithms for Cryptanalysis] [Abstract]
Date: 12/12/2022
- [09:30 – 10:30] – Invited Talk – Gregor Leander [Talk Title: Backdoors in Symmetric Cryptography] [Abstract]
- [11:20 – 13:00] – Foundation (4 Talks)
- [14:30 – 16:35] – Symmetric Key Cryptography (5 Talks)
- [17:00 – 18:40] – Protocol and Implementations (4 Talks)
- [18:45 – 19:15] – CRSI Annual Meeting
- [09:30 – 10:45] – Boolean Functions (3 Talks)
- [11:20 – 13:00] – Cryptanalysis (4 Talks)
- [14:30 – 15:30] – Invited Talk – Alexander May [Talk Title: When Partial Information Leaks Everything] [Abstract]
- [15:30 – 16:20] – Cryptanalysis (2 Talks)
- [17:00 – 18:30] – Cultural Program
- [19:30 – 20:15] – Rump Session (Part of the Banquet)
- [20:15 – 22:30] – Banquet
Date: 14/12/2022
- [09:30 – 10:30] – Invited Talk – V. Kamakoti [Talk Title: Virtualisation – A boon or bane?] [Abstract]
- [11:00 – 11:50] – Quantum Cryptography (2 Talks)
- [11:50 – 13:05] – Post Quantum Cryptography (3 Talks)
- [14:30 – 15:20] – Quantum Cryptography (2 Talks)
- [15:20 – 16:10] – Post Quantum Cryptography (2 Talks)
- [16:15 – 16:30] – Concluding Remarks and Vote of Thanks
Each paper presentation will be of 25 minutes (20 mins for presentation + 5 mins for Q/A).
Sessions (Talks are in order)
Foundation
- ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model: Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
- New Formalization and General Constructions of Adaptor Signatures: Wei Dai, Tatsuaki Okamoto, Go Yamamoto
- Entropic Hardness of Module-LWE from Module-NTRU: Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
- CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments: Behzad Abdolmaleki, Daniel Slamanig [Online]
Symmetric Key Cryptology
- Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules): Shanjie Xu, Qi Da, Chun Guo [Online]
- New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks: Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud’Homme
- INT-RUP Security of SAEB and TinyJAMBU: Nilanjan Datta, Avijit Dutta, Shibam Ghosh
- OCB+: Fast OCB-like Authenticated Encryption with BBB Security: Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
- ISAP+: ISAP with Fast Authentication: Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas López, Mridul Nandi
Protocols and Implementation
- Revisiting the Efficiency of Perfectly Secure Asynchronous Multi Party Computation Against General Adversaries: Ananya Appan, Ashish Choudhury, Anirudh Chandramouli
- Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric: Octavio Perez Kempner, Aisling Connolly, Pascal Lafourcade, Jerome Deschamps
- Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64: Hanno Becker, Matthias J. Kannwischer [Online]
- Parallel Isogeny Path Finding with Limited Memory: Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger [Online]
Cryptanalysis
- Distinguishing Error of Nonlinear Invariant Attacks: Subhabrata Samajder, Palash Sarkar
- Weak Subtweakeys in SKINNY: Daniël Kuijsters, Denise Verbakel, Joan Daemen
- Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 in the Known-key setting: Orr Dunkelman, Shibam Ghosh, Eran Lambooij
- Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK: Matteo Rossi, Emanuele Bellini, Matteo Protopapa, David Gerault
- Improved Truncated Differential Distinguishers of AES with Concrete S-box: Chengcheng Chang, Meiqin Wang, Ling Sun, Wei Wang [Online]
- Finding Three-Subset Division Property for Ciphers with Complex Linear Layers: Debasmita Chakraborty
Quantum Cryptography
- Quantum Attacks on PRFs Based on Public Random Permutations: Tingting Guo, Peng Wang, Dingfeng Ye, Lei Hu [Online]
- A Proposal for Device Independent Probabilistic Quantum Oblivious Transfer: Jyotirmoy Basak, Kaushik Chakraborty, Arpita Maitra, Subhamoy Maitra
- Improved Quantum Analysis of SPECK and LOW-MC: Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
- On Security Notions for Encryption in a Quantum World: Céline Chevalier, Ehsan Ebrahimi, Quoc Huy Vu [Online]
Post-Quantum Cryptography
- Revisiting the Security of Salted UOV Signature: Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit
- Two remarks on the vectorization problem: Wouter Castryck, Natan Vander Meeren
- Efficient IBS from a New Assumption in the Multivariate-Quadratic Setting: Sanjit Chatterjee, Tapas Pandit [Online]
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack: Daniel J. Bernstein [Online]
- An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015: Zijian Song, Jun Xu, Zhiwei Li, Dingfeng Ye [Online]
Boolean Functions
- Modifying Bent Functions to obtain the Balanced ones with High Nonlinearity: Subhamoy Maitra, Bimal Mandal, Manmatha Roy
- Revisiting BoolTest – On Randomness testing using Boolean functions: Bikshan Chatterjee, Rachit Parikh, Arpita Maitra, Subhamoy Maitra, Animesh Roy
- Weightwise almost perfectly balanced functions: secondary constructions for all n and better weightwise nonlinearities: Agnese Gini, Pierrick Méaux