Selected Areas in Cryptography (SAC) 2018
Selected Areas in Cryptography (SAC) 2018
Selected Areas in Cryptography (SAC) 2018
* Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock
Dor Fledel and Avishai Wool (Tel-Aviv University, Israel)
* A Generalized Attack on Some Variants of the RSA Cryptosystem
Abderrahmane Nitaj (Université de Caen Normandie, France), Yanbin Pan (Chinese Academy of Sciences, China) and Joseph Tonien (University of Wollongong, Australia)
* Unsupervised Machine Learning on Encrypted Data
Angela Jäschke and Frederik Armknecht (University of Mannheim, Germany)
* Finding Integral Distinguishers with Ease
Zahra Eskandari (Ferdowsi University of Mashhad, Iran), Andreas Brasen Kidmose (Technical University of Denmark), Stefan Kölbl (Technical University of Denmark & Cybercrypt, Denmark) and Tyge Tiessen (Technical University of Denmark)
* EFLASH: A New Multivariate Encryption Scheme
Ryann Cartor (University of Louisville, USA) and Daniel Smith-Tone (University of Louisville & NIST, USA)
* Provably secure NTRUEncrypt over any cyclotomic field
Yang Wang and Mingqiang Wang (Shandong University, China)
* Analysis of Error-Correcting Codes for Lattice-Based Key Exchange
Tim Fritzmann (Technical University of Munich, Germany), Thomas Pöppelmann (Infineon Technologies AG, Germany) and Johanna Sepulveda (Technical University of Munich, Germany)
* Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje
Christoph Dobraunig, Stefan Mangard (Graz University of Technology, Austria), Florian Mendel (Infineon Technologies AG, Germany) and Robert Primas (Graz University of Technology, Austria)
* Variants of the AES Key Schedule for Better Truncated Differential Bounds
Patrick Derbez, Pierre-Alain Fouque (Univ. Rennes, CNRS, IRISA, France), Jérémy Jean (ANSSI, France) and Baptiste Lambin (Univ. Rennes, CNRS, IRISA, France)
* Integral Attacks on Round-Reduced Bel-T-256
Muhammad Elsheikh, Mohamed Tolba and Amr Youssef (Concordia University, Canada)
* Targeted Ciphers for Format Preserving Encryption
Sarah Miracle and Scott Yilek (University of St. Thomas, USA)
* Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis
Ben Lapid and Avishai Wool (Tel-Aviv University, Israel)
* A Full RNS Variant of Approximate Homomorphic Encryption
Jung Hee Cheon, Kyoohyung Han, Andrey Kim (Seoul National University, South Korea), Miran Kim (University of Texas, Health Science Center at Houston, USA) and Yongsoo Song (University of California, San Diego, USA)
* On the cost of computing isogenies between supersingular elliptic curves
Gora Adj (University of Waterloo, Canada), Daniel Cervantes-Vázquez, Jesús-Javier Chi-Domínguez (CINVESTAV-IPN, Mexico), Alfred Menezes (University of Waterloo, Canada) and Francisco Rodríguez-Henríquez (CINVESTAV-IPN, Mexico)
* Towards Key-Dependent Integral and Impossible Differential Distinguishers on AES
Kai Hu, Tingting Cui (Shandong University, China), Chao Gao (Affiliated Hospital of Shandong University of Traditional Chinese Medicine, China) and Meiqin Wang (Shandong University, China)
* Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes
Yunwen Liu (KU Leuven, Belgium & National University of Defense Technology, China), Yu Sasaki (NTT Secure Platform Laboratories, Japan), Ling Song (Nanyang Technological University, Singapore & Chinese Academy of Sciences, China) and Gaoli Wang (East China Normal University, China)
* Assessing the Feasibility of Single Trace Power Analysis of Frodo
Joppe Bos (NXP Semiconductors, Belgium) and Simon Friedberger (NXP Semiconductors & KU Leuven, Belgium), Marco Martinoli, Martijn Stam, Elisabeth Oswald (University of Bristol, UK)
* Profiled Power Analysis Attacks using Convolutional Neural Networks with Domain Knowledge
Benjamin Hettwer, Stefan Gehrer (Robert Bosch GmbH, Germany) and Tim Güneysu (Ruhr University Bochum, Germany)
* Public Key Compression for Constrained Linear Signature Schemes
Ward Beullens, Alan Szepieniec and Bart Preneel (KU Leuven, Belgium)
* Mind the Gap - A closer look at the Security of Block Ciphers against Differential Cryptanalysis
Ralph Ankele (Royal Holloway, University of London) and Stefan Kölbl (Technical University of Denmark & Cybercrypt, Denmark)
* Injective Encodings to Binary Ordinary Elliptic curves
Reza Rezaeian Farashahi (Isfahan University of Technology & Institute for Research in Fundamental Sciences, Iran), Mojtaba Fadavi and Soheila Sabbaghian (Isfahan University of Technology, Iran)
* Analysis and Improvement of an Authentication Scheme in Incremental Cryptography
Louiza Khati (Ecole Normale Superieure & ANSSI, France) and Damien Vergnaud (Sorbonne Universite & Institut Universitaire de France)