Mount Allison University

Selected Areas in Cryptography 2015

The 22nd Conference on Selected Areas in Cryptography (SAC 2015) will be held at Mount Allison University in Sackville, New Brunswick, Canada, on August 12-14, 2015.

NEW! — In 2015, for the first time, SAC will be immediately preceded by the SAC Summer School (S3), which will run from August 10-12.

SAC 2015 Accepted Papers


  • Forgery Attacks on Round-Reduced ICEPOLE-128
    Christoph Dobraunig (IAIK, Graz University of Technology, Austria), Maria Eichlseder (IAIK, Graz University of Technology, Austria), Florian Mendel (IAIK, Graz University of Technology, Austria)

  • Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
    Muhammed F. Esgin (TÜBİTAK BİLGEM UEKAE, Turkey), Orhun Kara (TÜBİTAK BİLGEM UEKAE, Turkey)

  • Formal Treatment of Privacy-Enhancing Credential Systems
    Jan Camenisch (IBM Research - Zurich, Switzerland), Stephan Krenn (Austrian Institute of Technology, Austria), Anja Lehmann (IBM Research - Zurich, Switzerland), Gert Læssøe Mikkelsen (Alexandra Institute, Denmark), Gregory Neven (IBM Research - Zurich, Switzerland), Michael Østergaard Pedersen (Miracle A/S, Denmark)

  • Cryptanalysis of Feistel Networks with Secret Round Functions
    Alex Biryukov (University of Luxembourg, Luxembourg), Gaëtan Leurent (Inria, France), Léo Perrin (SnT and University of Luxembourg, Luxembourg)

  • Construction of Lightweight S-Boxes using Feistel and MISTY Structures
    Anne Canteaut (Inria, France), Sébastien Duval (Inria, France), Gaëtan Leurent (Inria, France)

  • Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption
    Marie Paindavoine (Université Claude Bernard Lyon 1, LIP, France), Bastien Vialla (Université Montpellier, LIRMM, France)

  • Bit Security of the CDH Problems over Finite Fields
    Mingqiang Wang (Shandong University, China), Tao Zhan (Shandong University, China), Haibin Zhang (University of North Carolina, Chapel Hill, USA)

  • Efficient One-Time Signatures
    Kassem Kalach (University of Waterloo, Canada), Reihaneh Safavi-Naini (University of Calgary, Canada)

  • Key-Recovery Attacks Against the MAC Algorithm Chaskey
    Chrysanthi Mavromati (Capgemini Sogeti, R&D Lab, France and Université de Versailles Saint-Quentin-en-Yvelines, France)

  • Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
    Haruna Higo (NEC Corporation, Japan), Toshiyuki Isshiki (NEC Corporation), Kengo Mori (NEC Corporation), Satoshi Obana (Hosei University)

  • Affine Equivalence and its Application to Tightening Threshold Implementations
    Pascal Sasdrich (Ruhr-University Bochum, Germany), Amir Moradi (Ruhr-University Bochum, Germany), Tim Güneysu (Ruhr-University Bochum, Germany)

  • Analysis of the CAESAR Candidate Silver
    Jérémy Jean (Nanyang Technological University, Singapore), Yu Sasaki (NTT Secure Platform Laboratories, Tokyo, Japan and Nanyang Technological University, Singapore), Lei Wang (Shanghai Jiao Tong University, China and Nanyang Technological University, Singapore)

  • Towards Optimal Bounds for Implicit Factorization Problem
    Yao Lu (State Key Laboratory of Information Security, China and The University of Tokyo, Japan), Liqiang Peng (State Key Laboratory of Information Security, China), Rui Zhang (State Key Laboratory of Information Security, China), Lei Hu (State Key Laboratory of Information Security, China), Dongdai Lin (State Key Laboratory of Information Security, China)

  • Sandy2x: New Curve25519 Speed Records
    Tung Chou (TU Eindhoven, The Netherlands)

  • Improved Meet-in-the-Middle Distinguisher on Feistel Schemes
    Li Lin (Chinese Academy of Sciences, China), Wenling Wu (Chinese Academy of Sciences, China), Yafei Zheng (Chinese Academy of Sciences, China)

  • Near Collision Side Channel Attacks
    Baris Ege (Radboud University, Nijmegen, The Netherlands), Thomas Eisenbarth (Worcester Polytechnic Institute, USA), Lejla Batina (Radboud University, Nijmegen, The Netherlands)

  • Related-Key Attack on Full-Round PICARO
    Anne Canteaut (Inria, France), Virginie Lallemand (Inria, France), María Naya-Plasencia (Inria, France)

  • Differential-Linear Cryptanalysis of COFFE
    Ivan Tjuawinata (Nanyang Technological University, Singapore), Tao Huang (Nanyang Technological University, Singapore), Hongjun Wu (Nanyang Technological University, Singapore)

  • ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
    Debapriya Basu Roy (Indian Institute of Technology Kharagpur, India), Poulami Das (Indian Institute of Technology Kharagpur, India), Debdeep Mukhopadhyay (Indian Institute of Technology Kharagpur, India)

  • Forgery and Subkey Recovery on CAESAR candidate iFeed
    Willem Schroé (KU Leuven, Belgium), Bart Mennink (KU Leuven, Belgium), Elena Andreeva (KU Leuven, Belgium), Bart Preneel (KU Leuven, Belgium)

  • Masking Large Keys in Hardware: A Masked Implementation of McEliece
    Cong Chen (Worcester Polytechnic Institute, USA), Thomas Eisenbarth (Worcester Polytechnic Institute, USA), Ingo von Maurich (Ruhr-University Bochum, Germany), Rainer Steinwandt (Florida Atlantic University, USA)

  • Scope : On the Side Channel Vulnerability of Releasing Unverified Plaintexts
    Dhiman Saha (Indian Institute of Technology Kharagpur, India), Dipanwita Roy Chowdhury (Indian Institute of Technology Kharagpur, India)

  • Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware
    Attila A. Yavuz (Oregon State University, USA), Jorge Guajardo Merchan (Robert Bosch LLC - RTC, USA)

  • Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
    Thomas Vannet (The University of Tokyo, Japan), Noboru Kunihiro (The University of Tokyo, Japan)

  • Differential Forgery Attack against LAC
    Gaëtan Leurent (Inria, France)

  • A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
    Yu Sasaki (NTT Secure Platform Laboratories, Japan), Kan Yasuda (NTT Secure Platform Laboratories, Japan)

  • Exploring Energy Efficiency of Lightweight Block Ciphers
    Subhadeep Banik (Technical University of Denmark, Denmark), Andrey Bogdanov (Technical University of Denmark, Denmark), Francesco Regazzoni (University of Lugano, Italy)

  • Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
    Andrey Bogdanov (Technical University of Denmark, Denmark), Ilya Kizhvatov (Riscure, The Netherlands), Kamran Manzoor (Technical University of Denmark, Denmark and Riscure, The Netherlands), Elmar Tischhauser (Technical University of Denmark, Denmark), Marc Witteman (Riscure, The Netherlands)

  • Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure
    Zhiyuan Guo (Chinese Academy of Sciences, China), Wenling Wu (Chinese Academy of Sciences, China), Si Gao (Chinese Academy of Sciences, China)