Selected Areas in Cryptography 2015
The 22nd Conference on Selected Areas in Cryptography (SAC 2015) will be held at
Mount Allison University in Sackville, New Brunswick, Canada, on August 12-14, 2015.
NEW! — In 2015, for the first time,
SAC will be immediately preceded by the
SAC Summer School (S3),
which will run from August 10-12.
SAC 2015 Accepted Papers
- Forgery Attacks on Round-Reduced ICEPOLE-128
Christoph Dobraunig (IAIK, Graz University of Technology, Austria), Maria Eichlseder (IAIK, Graz University of Technology, Austria), Florian Mendel (IAIK, Graz University of Technology, Austria)
- Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
Muhammed F. Esgin (TÜBİTAK BİLGEM UEKAE, Turkey), Orhun Kara (TÜBİTAK BİLGEM UEKAE, Turkey)
- Formal Treatment of Privacy-Enhancing Credential Systems
Jan Camenisch (IBM Research - Zurich, Switzerland), Stephan Krenn (Austrian Institute of Technology, Austria), Anja Lehmann (IBM Research - Zurich, Switzerland), Gert Læssøe Mikkelsen (Alexandra Institute, Denmark), Gregory Neven (IBM Research - Zurich, Switzerland), Michael Østergaard Pedersen (Miracle A/S, Denmark)
- Cryptanalysis of Feistel Networks with Secret Round Functions
Alex Biryukov (University of Luxembourg, Luxembourg), Gaëtan Leurent (Inria, France), Léo Perrin (SnT and University of Luxembourg, Luxembourg)
- Construction of Lightweight S-Boxes using Feistel and MISTY Structures
Anne Canteaut (Inria, France), Sébastien Duval (Inria, France), Gaëtan Leurent (Inria, France)
- Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption
Marie Paindavoine (Université Claude Bernard Lyon 1, LIP, France), Bastien Vialla (Université Montpellier, LIRMM, France)
- Bit Security of the CDH Problems over Finite Fields
Mingqiang Wang (Shandong University, China), Tao Zhan (Shandong University, China), Haibin Zhang (University of North Carolina, Chapel Hill, USA)
- Efficient One-Time Signatures
Kassem Kalach (University of Waterloo, Canada), Reihaneh Safavi-Naini (University of Calgary, Canada)
- Key-Recovery Attacks Against the MAC Algorithm Chaskey
Chrysanthi Mavromati (Capgemini Sogeti, R&D Lab, France and Université de Versailles Saint-Quentin-en-Yvelines, France)
- Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
Haruna Higo (NEC Corporation, Japan), Toshiyuki Isshiki (NEC Corporation), Kengo Mori (NEC Corporation), Satoshi Obana (Hosei University)
- Affine Equivalence and its Application to Tightening Threshold Implementations
Pascal Sasdrich (Ruhr-University Bochum, Germany), Amir Moradi (Ruhr-University Bochum, Germany), Tim Güneysu (Ruhr-University Bochum, Germany)
- Analysis of the CAESAR Candidate Silver
Jérémy Jean (Nanyang Technological University, Singapore), Yu Sasaki (NTT Secure Platform Laboratories, Tokyo, Japan and Nanyang Technological University, Singapore), Lei Wang (Shanghai Jiao Tong University, China and Nanyang Technological University, Singapore)
- Towards Optimal Bounds for Implicit Factorization Problem
Yao Lu (State Key Laboratory of Information Security, China and The University of Tokyo, Japan), Liqiang Peng (State Key Laboratory of Information Security, China), Rui Zhang (State Key Laboratory of Information Security, China), Lei Hu (State Key Laboratory of Information Security, China), Dongdai Lin (State Key Laboratory of Information Security, China)
- Sandy2x: New Curve25519 Speed Records
Tung Chou (TU Eindhoven, The Netherlands)
- Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
Li Lin (Chinese Academy of Sciences, China), Wenling Wu (Chinese Academy of Sciences, China), Yafei Zheng (Chinese Academy of Sciences, China)
- Near Collision Side Channel Attacks
Baris Ege (Radboud University, Nijmegen, The Netherlands), Thomas Eisenbarth (Worcester Polytechnic Institute, USA), Lejla Batina (Radboud University, Nijmegen, The Netherlands)
- Related-Key Attack on Full-Round PICARO
Anne Canteaut (Inria, France), Virginie Lallemand (Inria, France), María Naya-Plasencia (Inria, France)
- Differential-Linear Cryptanalysis of COFFE
Ivan Tjuawinata (Nanyang Technological University, Singapore), Tao Huang (Nanyang Technological University, Singapore), Hongjun Wu (Nanyang Technological University, Singapore)
- ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
Debapriya Basu Roy (Indian Institute of Technology Kharagpur, India), Poulami Das (Indian Institute of Technology Kharagpur, India), Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur, India)
- Forgery and Subkey Recovery on CAESAR candidate iFeed
Willem Schroé (KU Leuven, Belgium), Bart Mennink (KU Leuven, Belgium), Elena Andreeva (KU Leuven, Belgium), Bart Preneel (KU Leuven, Belgium)
- Masking Large Keys in Hardware: A Masked Implementation of McEliece
Cong Chen (Worcester Polytechnic Institute, USA), Thomas Eisenbarth (Worcester Polytechnic Institute, USA), Ingo von Maurich (Ruhr-University Bochum, Germany), Rainer Steinwandt (Florida Atlantic University, USA)
- Scope : On the Side Channel Vulnerability of Releasing Unverified Plaintexts
Dhiman Saha (Indian Institute of Technology Kharagpur, India), Dipanwita Roy Chowdhury (Indian Institute of Technology Kharagpur, India)
- Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
Attila A. Yavuz (Oregon State University, USA), Jorge Guajardo Merchan (Robert Bosch LLC - RTC, USA)
- Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
Thomas Vannet (The University of Tokyo, Japan), Noboru Kunihiro (The University of Tokyo, Japan)
- Differential Forgery Attack against LAC
Gaëtan Leurent (Inria, France)
- A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
Yu Sasaki (NTT Secure Platform Laboratories, Japan), Kan Yasuda (NTT Secure Platform Laboratories, Japan)
- Exploring Energy Efficiency of Lightweight Block Ciphers
Subhadeep Banik (Technical University of Denmark, Denmark), Andrey Bogdanov (Technical University of Denmark, Denmark), Francesco Regazzoni (University of Lugano, Italy)
- Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
Andrey Bogdanov (Technical University of Denmark, Denmark), Ilya Kizhvatov (Riscure, The Netherlands), Kamran Manzoor (Technical University of Denmark, Denmark and Riscure, The Netherlands), Elmar Tischhauser (Technical University of Denmark, Denmark), Marc Witteman (Riscure, The Netherlands)
- Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure
Zhiyuan Guo (Chinese Academy of Sciences, China), Wenling Wu (Chinese Academy of Sciences, China), Si Gao (Chinese Academy of Sciences, China)