Accepted Papers
Authenticated Encryption
- Revisiting the Security of COMET Authenticated Encryption Scheme
Shay Gueron, Ashwin Jha, and Mridul Nandi
- tHyENA: Making HyENA Even Smaller
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-L´opez, and Mridul Nandi
- Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
Bhargavi K.V.L., Chungath Srinivasan, and Lakshmy K.V.
Symmetric Cryptography
- Crooked Indifferentiability of Enveloped XOR Revisited
Rishiraj Bhattacharyya, Mridul Nandi, and Anik Raychaudhuri
- Sequential Indifferentiability of Confusion-Diffusion Networks
Qi Da, Shanjie Xu, and Chun Guo
- Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher
Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-L´opez, Mridul Nandi, and Yu Sasaki
Lightweight Cryptography
- Three Input Exclusive-OR Gate Support For Boyar-Peralta’s Algorithm
Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay, and Takanori Isobe
- Pushing the Limits: Searching for Implementations with the Smallest Area for Lightweight
S- Zhenyu Lu, Weijia Wang, Kai Hu, Yanhong Fan, Lixuan Wu, and Meiqin Wang
- Quantum Resource Estimation for FSR based Symmetric Ciphers & Related Grover’s Attacks
Ravi Anand, Arpita Maitra, Subhamoy Maitra, Chandra Sekhar Mukherjee, and Sourav Mukhopadhyay
Side-Channel Attacks
- Analyzing Masked Ciphers Against Transition and Coupling Effects
Siemen Dhooghe
- A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks
Abubakr Abdulgadir, Kamyar Mohajerani, Viet Ba Dang, Jens-Peter Kaps, and Kris Gaj
- Improving First-Order Threshold Implementations of SKINNY
Andrea Caforio, Daniel Collins, Ognjen Glamoˇcanin, and Subhadeep Banik
Fault Attacks
- Differential Fault Attack on Espresso
Bhagwan Bathe, Siddhartha Tiwari, Ravi Anand, Dibyendu Roy, and Subhamoy Maitra
- Differential Fault Attack on Montgomery Ladder and in the Presence of Scalar Randomization
Andy Russon
- Fault-Enabled Chosen-Ciphertext Attacks on Kyber
Julius Hermelink, Peter Pessl, and Thomas Poppelmann
Post-Quantum Cryptography
- DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting
Robi Pedersen
- Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.
Surbhi Shaw and Ratna Dutta
- Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting
Sanjit Chatterjee, Akansha Dimri, and Tapas Pandit
Public Key Encryption and Protocols
- Identity-Based Matchmaking Encryption without Random Oracles
Danilo Francati, Alessio Guidi, Luigi Russo, and Daniele Venturi
- Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain
Seiya Nuta, Jacob C. N. Schuldt, and Takashi Nishide
- Cryptanalysis of the Privacy-Preserving Ride-Hailing Service TRACE
Deepak Kumaraswamy and Srinivas Vivek
Cryptographic Constructions
- Exipnos: An Efficient Verifiable Dynamic Symmetric Searchable Encryption Scheme with Forward and Backward Privacy
Najwa Aaraj, Chiara Marcolla, and Xiaojie Zhu
- Smooth Zero-Knowledge Hash Functions
Behzad Abdolmaleki, Hamidreza Khoshakhlagh, and Helger Lipmaa
- Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation
Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
Blockchains
- On Elapsed Time Consensus Protocols
Mic Bowman, Debajyoti Das, Avradip Mandal, and Hart Montgomery
- Time-release Cryptography from Minimal Circuit Assumptions
Samuel Jaques, Hart Montgomery, Razvan Rosie, and Arnab Roy
- Succinct Publicly-Certifiable Proofs (or, Can a Blockchain Verify a Designated-Verifier Proof ?)
Matteo Campanelli and Hamidreza Khoshakhlagh