Accepted Papers


  1. A note on Ring-LWE security in the case of Fully Homomorphic Encryption
    Guillaume Bonnoron; Caroline Fontaine
    Chair of Naval Cyber Defence; CNRS and IMT Atlantique
  2. Architecture level Optimizations for Kummer based HECC on FPGAs
    Gabriel Gallin; Turku Ozlum Celik; Arnaud Tisserand
    INRIA Rennes and University Rennes 1; University Rennes 1; CNRS and University South Brittany
  3. Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round
    Alexandre Adomnicai; Jacques J. A. Fournier; Laurent Masson
    Trusted Objects, ENSM-SE; CEA-Leti; Trusted Objects
  4. CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
    Sanjit Chatterjee; Sayantan Mukherjee; Tapas Pandit
    Indian Institute of Science, Bangalore; Indian Institute of Science, Bangalore; Indian Institute of Science, Bangalore
  5. Cold Boot Attacks on NTRU
    Kenneth G. Paterson; Ricardo Villanueva-Polanco
    Royal Holloway, University of London; Royal Holloway, University of London
  6. Differential Cryptanalysis of 18-Round PRIDE
    Virginie Lallemand; Shahram Rasoolzadeh
    Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany; Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany
  7. DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates
    Jiji Angel; Rahul R; Ashokkumar C; Bernard Menezes
    Indian Institute of Technology Bombay; Indian Institute of Technology Bombay; Indian Institute of Technology Bombay; Indian Institute of Technology Bombay
  8. Efficient Construction of Diamond Structures
    Ariel Weizmann; Orr Dunkelman; Simi Haber
    Bar Ilan University, Israel; University of Haifa, Israel; Bar Ilan University, Israel
  9. Efficient Optimal Ate Pairing at 128-bit Security Level
    Md. Al-Amin Khandaker; Yuki Nanjo; Loubna Ghammam; Yasuyuki Nogami; Yuta Kodera; Sylvain Duquesne
    Okayama University; Okayama University; Normandie University; Okayama University; Okayama University; University of Rennes 1.
  10. Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
    Saud A. Al Musa; Guangwu Xu
    University of Wisconsin-Milwaukee; University of Wisconsin-Milwaukee
  11. Field lifting for smaller UOV public keys
    Ward Beullens; Bart Preneel
    imec-COSIC KU Leuven; imec-COSIC KU Leuven
  12. Gabidulin matrix codes and their application to small ciphertext size cryptosystems
    Thierry P. Berger; Philippe Gaborit; Olivier Ruatta
    CNRS and University of Limoges; CNRS and University of Limoges; CNRS and University of Limoges.
  13. Lightweight Design Choices for LED-like Block Ciphers
    Sumanta Sarkar; Habeeb Syed; Rajat Sadhukhan; Debdeep Mukhopadhyay
    TCS Innovation Labs, Hyderabad; TCS Innovation Labs, Hyderabad; Indian Institute of Technology, Kharagpur; Indian Institute of Technology, Kharagpur
  14. Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption
    Mustafa Khairallah; Anupam Chattopadhyay; Thomas Peyrin
    NTU, Singapore; NTU, Singapore; NTU, Singapore
  15. Improved Differential Cryptanalysis on Generalized Feistel Schemes Ivan Tjuawinata; Tao Huang; Hongjun Wu
    Nanyang Technological University; Nanyang Technological University; Nanyang Technological University
  16. Improvements for Gate-Hiding Garbled Circuits
    Mike Rosulek
    Oregon State University
  17. Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor palpha qbeta
    Patrick Holzer; Thomas Wunderer; Johannes A. Buchmann
    TU Darmstadt; TU Darmstadt; TU Darmstadt
  18. Revisiting a Masked Lookup-Table Compression Scheme
    Srinivas Vivek
    University of Bristol, UK
  19. Several Masked Implementations of the Boyar-Peralta AES S-Box
    Ashrujit Ghoshal; Thomas De Cnudde
    Indian Institute of Technology, Kharagpur; KU Leuven, ESAT-COSIC and imec, Belgium