In Cooperation with IACR

The 24th Annual Conference on Selected Areas in Cryptography

Ottawa, Ontario, Canada, August 16 - 18, 2017

Accepted Papers

The list of accepted papers for SAC 2017 is as follows:

Yang Yu and Léo Ducas. Second Order Statistical Behavior of LLL and BKZ
Markku-Juhani Olavi Saarinen. HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida and Goichiro Hanaoka. A Public-key Encryption Scheme based on Non-linear Indeterminate Equations
Thomaz Oliveira, Julio López, Hüseyin Hisil, Armando Faz-Hernandez and Francisco Rodríguez-Henríquez. How to (pre-)compute a ladder
Daniel P. Martin, Ashley Montanaro, Elisabeth Oswald and Dan Shepherd. Quantum Key Search with Side Channel Advice
Hairong Yi, Yuqing Zhu and Dongdai Lin. Refinement of the Four-Dimensional GLV Method on Elliptic Curves
Edward Eaton. Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model
Mohamed Tolba, Ahmed Abdelkhalek and Amr Youssef. Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128
Riham Altawy, Raghvendra Rohit, Morgan He, Kalikinkar Mandal, Gangqiang Yang and Guang Gong. sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives
Brian Koziel, Reza Azarderakhsh and David Jao. Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Amir Jalali, Reza Azarderakhsh and Mehran Mozaffari-Kermani. Efficient Post-Quantum Undeniable Signature on 64-bit ARM
Reza Azarderakhsh, David Jao and Christopher Leonardi. Post-quantum static-static key agreement using multiple protocol instances
Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun and Zhu Wang. Categorising and Comparing Cluster-Based DPA Distinguishers
Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange and Christine van Vredendaal. NTRU Prime
Jean-Claude Bajard, Julien Eynard, Anwar Hasan, Paulo Martins, Leonel Sousa and Vincent Zucca. Efficient reductions in polynomial rings - Application to Ring-LWE based FHE schemes
Leon Groot Bruinderink and Andreas Huelsing. "Oops, I did it again'' -- Security of One-Time Signatures under Two-Message Attacks
Ray Perlner, Albrecht Petzoldt and Daniel Smith-Tone. Total Break of the SRP Encryption Scheme
Xavier Bonnetain. Quantum Key-Recovery on full AEZ
Jean-Francois Biasse. Approximate short vectors in ideal lattices of Q(zeta_{p^e}) with precomputation of the class group
Bailey Kacsmar, Sarah Plosker and Ryan Henry. Computing Low-Weight Discrete Logarithms
Gustavo Banegas and Daniel J. Bernstein. Low-communication parallel quantum multi-target preimage search
Laurent Grémy, Aurore Guillevic, François Morain and Emmanuel Thomé. Computing discrete logarithms over GF(p^6)
Robin Kwant, Tanja Lange and Kimberley Thissen. Lattice Klepto - Turning Post-Quantum Crypto Against Itself