Accepted Papers

    Authenticated Encryption

  1. Revisiting the Security of COMET Authenticated Encryption Scheme
    Shay Gueron, Ashwin Jha, and Mridul Nandi
  2. tHyENA: Making HyENA Even Smaller
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-L´opez, and Mridul Nandi
  3. Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi K.V.L., Chungath Srinivasan, and Lakshmy K.V.

  4. Symmetric Cryptography

  5. Crooked Indifferentiability of Enveloped XOR Revisited
    Rishiraj Bhattacharyya, Mridul Nandi, and Anik Raychaudhuri
  6. Sequential Indifferentiability of Confusion-Diffusion Networks
    Qi Da, Shanjie Xu, and Chun Guo
  7. Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
    Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-L´opez, Mridul Nandi, and Yu Sasaki

  8. Lightweight Cryptography

  9. Three Input Exclusive-OR Gate Support For Boyar-Peralta’s Algorithm
    Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, and Takanori Isobe
  10. Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight
    S- Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, and Meiqin Wang
  11. Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover’s Attacks
    Ravi Anand, Arpita Maitra, Subhamoy Maitra, Chandra Sekhar Mukherjee, and Sourav Mukhopadhyay

  12. Side-Channel Attacks

  13. Analyzing Masked Ciphers Against Transition and Coupling Effects
    Siemen Dhooghe
  14. A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
    Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, and Kris Gaj
  15. Improving First-Order Threshold Implementations of SKINNY
    Andrea Caforio, Daniel Collins, Ognjen Glamoˇcanin, and Subhadeep Banik

  16. Fault Attacks

  17. Differential Fault Attack on Espresso
    Bhagwan Bathe, Siddhartha Tiwari, Ravi Anand, Dibyendu Roy, and Subhamoy Maitra
  18. Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization
    Andy Russon
  19. Fault-Enabled Chosen-Ciphertext Attacks on Kyber
    Julius Hermelink, Peter Pessl, and Thomas Poppelmann

  20. Post-Quantum Cryptography

  21. DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting
    Robi Pedersen
  22. Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.
    Surbhi Shaw and Ratna Dutta
  23. Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting
    Sanjit Chatterjee, Akansha Dimri, and Tapas Pandit

  24. Public Key Encryption and Protocols

  25. Identity-Based Matchmaking Encryption without Random Oracles
    Danilo Francati, Alessio Guidi, Luigi Russo, and Daniele Venturi
  26. Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain
    Seiya Nuta, Jacob C. N. Schuldt, and Takashi Nishide
  27. Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE
    Deepak Kumaraswamy and Srinivas Vivek

  28. Cryptographic Constructions

  29. Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy
    Najwa Aaraj, Chiara Marcolla, and Xiaojie Zhu
  30. Smooth Zero-Knowledge Hash Functions
    Behzad Abdolmaleki, Hamidreza Khoshakhlagh, and Helger Lipmaa
  31. Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation
    Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki

  32. Blockchains

  33. On Elapsed Time Consensus Protocols
    Mic Bowman, Debajyoti Das, Avradip Mandal, and Hart Montgomery
  34. Time-release Cryptography from Minimal Circuit Assumptions
    Samuel Jaques, Hart Montgomery, Razvan Rosie, and Arnab Roy
  35. Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof ?)
    Matteo Campanelli and Hamidreza Khoshakhlagh