SAC 2016 Slides
Click on paper titles to see slides.
Not all papers have slides available.
Invited Talks
Francesco Regazzoni
Post-Quantum Key Exchange for the Internet
Douglas Stebila
Side Channels and
Fault Attacks I
Detecting Side Channel
Vulnerabilities in Improved Rotating S-box Masking Scheme Presenting
Four Non-profiled Attacks
Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma and Zongbin Liu
Tobias Schneider, Amir Moradi, Francois-Xavier Standaert and Tim Gneysu
Uniform First-Order Threshold
Implementations
Tim Beyne, Begl Bilgin and Vincent Rijmen
Design and Implementation of Symmetric Cryptography
On the Construction of Hardware-friendly 4x4
and 5x5 S-boxes
Stjepan Picek, Bohan Yang, Vladimir Rozic and Nele Mentens
All the AES You Need on Cortex-M3 and -M4
Peter Schwabe and Ko Stoffelen
Efficient Classical
Public Key Cryptography
Fast, Uniform Scalar Multiplication for Genus
2 Jacobians with Fast Kummers
Ping Ngai Chung, Craig Costello and Benjamin Smith
PhiRSA: Exploiting the Computing Power of
Vector Instructions on Intel Xeon Phi for RSA
Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue and Fangyu Zheng
FourQNEON: Faster Elliptic Curve Scalar
Multiplications on ARM Processors
Patrick Longa
Cryptanalysis of Symmetric Primitives I
New Second Preimage
Attacks on Dithered Hash Functions with Low Memory Complexity
Muhammad Barham, Orr Dunkelman, Stefan Lucks and Marc Stevens
Yu Sasaki and Yosuke Todo
Christoph Dobraunig, Maria Eichlseder and Florian Mendel
Lattice-Based
Cryptography
Fixed-Point Arithmetic
in SHE Schemes
Anamaria Costache, Nigel P. Smart, Srinivas Vivek and Adrian Waller
A Full RNS Variant of FV like Somewhat
Homomorphic Encryption Schemes
Jean-Claude Bajard, Julien Eynard, Anwar Hasan and Vincent Zucca
Security Considerations for Galois RLWE
Families
Hao Chen, Kristin Lauter and Katherine Stange
MACs and PRNGs
Output Masking of Tweakable Even-Mansour can
be Eliminated for Message Authentication Code
Shoichi Hirose, Yusuke Naito and Takeshi Sugawara
Improved Algebraic MACs and Practical
Keyed-Verification Anonymous Credentials
Amira Barki, Solenn Brunet, Nicolas Desmoulins and Jacques Traore
A Robust and Sponge-Like PRNG with Improved
Efficiency
Daniel Hutchinson
Side Channels and Fault Attacks II
Attacking Embedded ECC Implementations Through
cmov Side Channels
Erick Nascimento, Lukasz Chmielewski, David Oswald and Peter Schwabe
Lattice Attacks against Elliptic-Curve
Signatures with Blinded Scalar Multiplication
Dahmun Goudarzi, Matthieu Rivain and Damien Vergnaud
Loop-Abort Faults on Lattice-Based
Fiat-Shamir and Hash-and-Sign Signatures
Thomas Espitau, Benot Grard, Pierre-Alain Fouque, and Mehdi Tibouchi
Cryptanalysis of
Symmetric Primitives II
An Efficient Affine Equivalence Algorithm
for Multiple S-Boxes and a Structured Affine Layer
Jung Hee Cheon, Hyunsook Hong, Joohee Lee and Jooyoung Lee
Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3
Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent and John Schanck
Efficient Symmetric
Primitives
Hold Your Breath, PRIMATEs Are Lightweight
Danilo Šijačić, Andreas Brasen Kidmose, Bohan Yang, Subhadeep Banik, Begl Bilgin, Andrey Bogdanov and Ingrid Verbauwhede
Keymill: Side-Channel Resilient Key
Generator
Mostafa Taha, Arash Reyhani-Masoleh and Patrick Schaumont
Lightweight Fault Attack Resistance in
Software Using Intra-Instruction Redundancy
Conor Patrick, Bilgiday Yuce, Nahid Ghalaty and Patrick Schaumont
Cryptanalysis of
Asymmetric Primitives
Sieving for Closest Lattice Vectors (with Preprocessing)
Thijs Laarhoven
Key Recovery Attack on the Cubic ABC Simple
Matrix Multivariate Encryption Scheme
Dustin Moody, Ray Perlner and Daniel Smith-Tone
Solving Discrete Logarithms on a 170-bit MNT
Curve by Pairing Reduction
Aurore Guillevic, Franois Morain and Emmanuel Thom