Program


Sunday, December 6

8:30 -- 9:30 Registration
9:30 -- 11:00 Tutorial 1 - Lecture 1
Yevgeniy Dodis: On randomness,  codes and extractors in cryptography
11:00 -- 11:30 Break
11:30 -- 12:30 Tutorial 1 - Lecture 2
Yevgeniy Dodis: On randomness,  codes and extractors in cryptography
12:30 -- 14:00 Lunch
14:00 -- 15:30 Tutorial 2 - Lecture 1
Manoj Prabhakaran: Secure Multi-Party Computation: A Tutorial
15:30 -- 16:00 Break
16:00 -- 17:00 Tutorial 2 - Lecture 2
Manoj Prabhakaran: Secure Multi-Party Computation: A Tutorial

 

Monday, December 7

8:30 -- 9:30 Registration
9:30 -- 11:10 Session 1 (4 talks : Cryptanalysis I) (Chair: Arpita Patra)
  • Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48
    by Mahmed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri and Praveen Gauravaram.
  • Some Results using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-like Ciphers    
    by Thierry Berger and Marine Minier.
  • Improved meet-in-the-middle attacks on 7 and 8 rounds ARIA-192 and ARIA-256
    by Akshima Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel and Somitra Kumar Sanadhya
  • Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE       
    by Huiling Zhang and Wenling Wu
11:10 -- 11:30 Break
11:30 -- 12:30 Invited Talk 1 (Chair: Manoj Prabhakaran)
Alon Rosen: On the Cryptographic Hardness of Finding a Nash Equilibrium
12:30 -- 14:00 Lunch
14:00 -- 15:00 Invited Talk 2 (Chair: Satya Lokam)
Itai Dinur: The Power of Linear Algebra: Breaking Block Ciphers Using Linearization
15:00 -- 15:30 Break
15:30 -- 16:45 Session 2 (3 talks : Public Key Cryptography 1) (Chair: Somitra Sanadhya)
  • Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
    by Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay
  • Lite-Rainbow: Lightweight Signature Schemes based on Multivariate Quadratic Equations and Their Secure Implementations
    by Kyung-Ah Shim, Cheol-Min Park and Yu-Jin Baek
  • Lossy Projective Hashing and Its Applications
    by Haiyang Xue, Yamin Liu, Xianhui Lu and Bao Li

 

Tuesday, December 8

9:30 -- 11:10

Session 3 (4 talks : Information Theoretic Cryptography + Lightweight cryptography) (Chair: Bhavana Kanukurthi)

Information Theoretic Cryptography
  • Non-Malleable Extractors with Shorter Seeds and Their Applications
    by Yanqing Yao and Zhoujun Li
  • Efficiently Simulating High Min-Entropy Sources in the Presence of Side Information
    by Maciej Skorski        
Lightweight Cryptography
  • BitCryptor: Bit-Serialized Flexible Crypto Engine for Lightweight Applications
    by Ege Gulcan, Aydin Aysu and Patrick Schaumont
  • Low-Resource and Fast Binary Edwards Curves Cryptography
    by Brian Koziel, Reza Azarderakhsh and Mehran Mozaffari Kermani
11;10 -- 11:30 Break
11:30 -- 12:30 Invited Talk 3 (Chair: Nishanth Chandran)
Seny Kamara: Encrypted Search: Theory, Practice and Cryptanalysis
12:30 -- 14:00 Lunch
14:00 -- 15:00 Invited Talk 4 (Chair: Rishiraj Bhattacharyya)
Palash Sarkar: Another Look at Normal Approximations in Cryptanalysis
15:00 -- 15:30 Break
15:30 -- 16:45 Session 4 (3 talks : Cryptanalysis 2) (Chair: Itai Dinur)
  • Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents
    by Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar, Jun Xu and Zhangjie Huang
  • Some results on Sprout
    by Subhadeep Banik
  • Linear Cryptanalysis of Reduced-Round SIMECK Variants
    by Nasour Bagheri
17:00 -- 18:00 CRSI General Body Meeting
19:00 -- 22:00 Banquet dinner at Main Guest House

 

Wednesday, December 9

9:30 -- 10:45 Session 5 ( 3 talks : Side-channel Attacks) (Chair: Sanjit Chatterjee)
  • Cryptanalysis of two fault countermeasure schemes
    by Subhadeep Banik and Andrey Bogdanov
  • Differential Fault Analysis of SHA-3
    by Nasour Bagheri, Navid Ghaedi Bardeh and Somitra Sanadhya
  • A Key to Success: Success Exponents for Side-Channel Distinguishers
    by Annelie Heuser, Olivier Rioul and Sylvain Guilley.
10:45 -- 11:15 Break
11:15 -- 12:15 Invited Talk 5 (Chair: Shweta Agrawal)
Sanjam Garg: New Advances in Program Obfuscation
12:15 -- 14:00 Lunch
14:00 -- 14:50 Session 6 (2 talks : Public Key Cryptography 2) (Chair: Seny Kamara)
  • Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing
    by Sikhar Patranabis, Yash Shrivastava and Debdeep Mukhopadhyay   
  • (De-)Constructing TLS 1.3
    by Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann and Daniele Venturi

 

Sponsors