Accepted Papers
1: Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES
Lorenzo Grassi, Christian Rechberger
Digital Security Group, Radboud University, Nijmegen, Netherlands & IAIK, Graz University of Technology, Graz, Austria
4: Handle the Traces: Revisiting the Attack on ECDSA with EHNP
Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li
Strategic Support Force Information Engineering University, Zhengzhou 450001, China, Key Laboratory of Mathematics Mechanization, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190, China, Xidian University, Xi'an 710071, China
5: Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda, Koji Nuida
The University of Tokyo, Tokyo, Japan, Institute of Mathematics for Industry (IMI), Kyushu University, Fukuoka, Japan, National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan
13: Fiat-Shamir Signatures based on Module-NTRU
Shi Bai, Austin Beard, Floyd Johnson, Sulani Kottal Baddhe Vidhanalage, Tran Ngo
Department of Mathematical Sciences, Florida Atlantic University
20: Speeding-Up Isogeny Computation using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
University of Waterloo, Ontario, Canada, The University of Tokyo, Tokyo, Japan
24: PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
Osaka University, Suita, Japan, National Institute of Information and Communications Technology, Koganei, Japan, Japan Advanced Institute of Science and Technology, Nomi, Japan
25: Multi-signatures for ECDSA and its Applications in Blockchain
Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
The University of Hong Kong
26: Hybrid Dual and Meet-LWE Attack
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
KLOIS, Institute of Information Engineering, CAS, Beijing 100093, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, 100049, China, State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China, Nanyang Technological University, Singapore 639798, Singapore
27: Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018
Wenshuo Guo, Fang-Wei Fu
Chern Institute of Mathematics and LPMC, Nankai University, Tianjin, China
28: Verifiable Decryption in the Head
Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
Norwegian University of Science and Technology, Australian National University, University of Luxembourg, Université de Lorraine, CNRS, LORIA
29: Improved Differential Attack on Round-Reduced LEA
Yuhan Zhang, Wenling Wu, Lei Zhang
Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Science, Beijing 100190, China, University of Chinese Academy of Sciences, Beijing 100049, China
30: Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
Jian Guo, Ling Song, Haoyang Wang
Nanyang Technological University, Singapore, Jinan University, China, Shanghai Jiao Tong University, China
31: SoK: Decentralized Randomness Beacon Protocols
Mayank Raikwar, Danilo Gligoroski
Norwegian University of Science and Technology (NTNU) Trondheim, Norway
34: Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
Security, Paris, France, NEC, Kawasaki, Japan, Yokohama National University, Japan, NEC Solution Innovators, Hokuriku, Japan
37: Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China, School of Cyber Science and Technology, Shandong University, Qingdao, China, The University of Hong Kong, Pokfulam, Hong Kong, State Key Laboratory of Information Security, Institute of Information, Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
40: DeChain: A Blockchain Framework Enhancing Decentralization via Sharding
Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu
Shanghai Jiao Tong University
41: Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints
Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
Indian Institute of Technology Jodhpur, India
44: On Security of Fuzzy Commitment Scheme for Biometric Authentication
Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra
IIIT-Delhi, India, NIST, Gaithersburg, MD, USA, TCS Research, India, Shiv Nadar University, India, Irisys Co. Ltd., Seoul, Korea
47: CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts
Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu
Nanjing University of Aeronautics and Astronautics, Nanjing, China, South China Agricultural University, Guangzhou, China, Shandong University, Jinan, China
49: Improved Division Property for Ciphers with Complex Linear Layers
Yongxia Mao, Wenling WU, Bolin WANG, Li ZHANG
Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
52: Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace
Yumei Li, Mingwu Zhang, Futai Zhang
Hubei University of Technology, Wuhan, China, Fujian Normal University, Fuzhou, China, Guangxi Key Laboratory of Cryptography and Information Security, Xiangyang Industrilal Institute of Hubei University of Technology
57: Garrison: A Novel Watchtower Scheme for Bitcoin
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
Faculty of Information Technology, Monash University, Melbourne, Australia
58: TIDE: A novel approach to constructing timed-release encryption
Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
Royal Holloway, University of London, United Kingdom
59: An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security
Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
Faculty of Information Technology, Monash University, Australia, CSIRO's Data61, Australia
63: Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics
Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong, Gaopeng Gou
Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China