Program


Date: 11/12/2022

  • [08:3009:30] – Registration
  • [09:30 – 11:00] – Inauguration [by Dr. Purnendu Chatterjee]
  • [11:00 – 12:30] – Tutorial Talk – Santanu Sarkar [Talk Title: Lattice-based attacks on RSA] [Abstract]
  • [14:00 – 15:30] – Tutorial Talk – Mridul Nandi [Talk Title:  Distinguishing Attacks on Symmetric Key Designs] [Abstract]
  • [15:30 – 17:00] – Tutorial Talk – Patrick Derbez [Tools and Algorithms for Cryptanalysis] [Abstract]

Date: 12/12/2022

  • [09:30 – 10:30] – Invited Talk – Gregor Leander [Talk Title: Backdoors in Symmetric Cryptography] [Abstract]
  • [11:20 – 13:00] – Foundation (4 Talks)
  • [14:30 – 16:35] – Symmetric Key Cryptography (5 Talks)
  • [17:00 – 18:40] – Protocol and Implementations (4 Talks)
  • [18:45 – 19:15] – CRSI Annual Meeting

Date: 13/12/2022
  • [09:30 – 10:45] – Boolean Functions (3 Talks)
  • [11:20 – 13:00] – Cryptanalysis (4 Talks)
  • [14:30 – 15:30] – Invited Talk – Alexander May [Talk Title: When Partial Information Leaks Everything] [Abstract]
  • [15:30 – 16:20] – Cryptanalysis (2 Talks)
  • [17:00 – 18:30] – Cultural Program
  • [19:30 – 20:15] – Rump Session (Part of the Banquet)
  • [20:15 – 22:30] – Banquet


Date: 14/12/2022

  • [09:30 – 10:30] – Invited Talk – V. Kamakoti [Talk Title: Virtualisation – A boon or bane?] [Abstract]
  • [11:00 – 11:50] – Quantum Cryptography (2 Talks)
  • [11:50 – 13:05] – Post Quantum Cryptography (3 Talks)
  • [14:30 – 15:20] – Quantum Cryptography (2 Talks)
  • [15:20 – 16:10] – Post Quantum Cryptography (2 Talks)
  • [16:15 – 16:30] – Concluding Remarks and Vote of Thanks

Each paper presentation will be of 25 minutes (20 mins for presentation + 5 mins for Q/A).
 
 

 

 
 

Sessions (Talks are in order)

Foundation

  1. ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model: Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
  2. New Formalization and General Constructions of Adaptor Signatures: Wei Dai, Tatsuaki Okamoto, Go Yamamoto
  3. Entropic Hardness of Module-LWE from Module-NTRU: Katharina Boudgoust, Corentin Jeudy, Adeline Roux-Langlois, Weiqiang Wen
  4. CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments: Behzad Abdolmaleki, Daniel Slamanig [Online]


Symmetric Key Cryptology

  1. Minimizing Even-Mansour Ciphers for Sequential Indifferentiability (Without Key Schedules): Shanjie Xu, Qi Da, Chun Guo [Online]
  2. New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks: Stéphanie Delaune, Patrick Derbez, Arthur Gontier, Charles Prud’Homme
  3. INT-RUP Security of SAEB and TinyJAMBU: Nilanjan Datta, Avijit Dutta, Shibam Ghosh
  4. OCB+: Fast OCB-like Authenticated Encryption with BBB Security: Arghya Bhattacharjee, Ritam Bhaumik, Mridul Nandi
  5. ISAP+: ISAP with Fast Authentication: Arghya Bhattacharjee, Avik Chakraborti, Nilanjan Datta, Cuauhtemoc Mancillas López, Mridul Nandi


Protocols and Implementation

  1. Revisiting the Efficiency of Perfectly Secure Asynchronous Multi Party Computation Against General Adversaries: Ananya Appan, Ashish Choudhury, Anirudh Chandramouli
  2. Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric: Octavio Perez Kempner, Aisling Connolly, Pascal Lafourcade, Jerome Deschamps
  3. Hybrid scalar/vector implementations of Keccak and SPHINCS+ on AArch64: Hanno Becker, Matthias J. Kannwischer [Online]
  4. Parallel Isogeny Path Finding with Limited Memory: Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez, Monika Trimoska, Floyd Zweydinger [Online]


Cryptanalysis

  1. Distinguishing Error of Nonlinear Invariant Attacks: Subhabrata Samajder, Palash Sarkar
  2. Weak Subtweakeys in SKINNY: Daniël Kuijsters, Denise Verbakel, Joan Daemen
  3. Full Round Zero-sum Distinguishers on TinyJAMBU-128 and TinyJAMBU-192 in the Known-key setting: Orr Dunkelman, Shibam Ghosh, Eran Lambooij
  4. Monte Carlo Tree Search for automatic differential characteristics search: application to SPECK: Matteo Rossi, Emanuele Bellini, Matteo Protopapa, David Gerault
  5. Improved Truncated Differential Distinguishers of AES with Concrete S-box: Chengcheng Chang, Meiqin Wang, Ling Sun, Wei Wang [Online]
  6. Finding Three-Subset Division Property for Ciphers with Complex Linear Layers: Debasmita Chakraborty

Quantum Cryptography

  1. Quantum Attacks on PRFs Based on Public Random Permutations: Tingting Guo, Peng Wang, Dingfeng Ye, Lei Hu [Online]
  2. A Proposal for Device Independent Probabilistic Quantum Oblivious Transfer: Jyotirmoy Basak, Kaushik Chakraborty, Arpita Maitra, Subhamoy Maitra
  3. Improved Quantum Analysis of SPECK and LOW-MC: Kyungbae Jang, Anubhab Baksi, Hyunji Kim, Hwajeong Seo, Anupam Chattopadhyay
  4. On Security Notions for Encryption in a Quantum World: Céline Chevalier, Ehsan Ebrahimi, Quoc Huy Vu [Online]


Post-Quantum Cryptography

  1. Revisiting the Security of Salted UOV Signature: Sanjit Chatterjee, M. Prem Laxman Das, Tapas Pandit
  2. Two remarks on the vectorization problem: Wouter Castryck, Natan Vander Meeren
  3. Efficient IBS from a New Assumption in the Multivariate-Quadratic Setting: Sanjit Chatterjee, Tapas Pandit [Online]
  4. A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack: Daniel J. Bernstein [Online]
  5. An Efficient Key Recovery Attack Against NTRUReEncrypt from AsiaCCS 2015: Zijian Song, Jun Xu, Zhiwei Li, Dingfeng Ye [Online]

Boolean Functions

  1. Modifying Bent Functions to obtain the Balanced ones with High Nonlinearity: Subhamoy Maitra, Bimal Mandal, Manmatha Roy
  2. Revisiting BoolTest – On Randomness testing using Boolean functions: Bikshan Chatterjee, Rachit Parikh, Arpita Maitra, Subhamoy Maitra, Animesh Roy
  3. Weightwise almost perfectly balanced functions: secondary constructions for all n and better weightwise nonlinearities: Agnese Gini, Pierrick Méaux

 

 


Back to Indocrypt Home Page