SAC logo
Selected Areas in Cryptography 2023
University of New Brunswick
August 14-18, 2023
Fredericton, New Brunswick


Schedule


Mon Aug 14
8:30 AM – 9:00 AM
ITC 307

SAC Summer School - Registration


Mon Aug 14
9:00 AM – 10:30 AM
ITC 317

SAC Summer School - Lattice-based cryptography, Part 1

A tutorial on lattice-based cryptography

Adeline Roux-Langlois, CNRS, GREYC, France

I will introduce lattices and hard problems over lattices, the LWE and SIS problems and explain how they are used to build encryption and signature schemes. Then I will introduce algebraic variants of LWE and SIS and how to build efficient constructions based on those variants.

Mon Aug 14
10:30 AM – 11:00 AM
ITC 307

Coffee Break


Mon Aug 14
11:00 AM – 12:15 PM
ITC 317

SAC Summer School - Lattice-based cryptography, Part 2

A tutorial on lattice-based cryptography

Adeline Roux-Langlois, CNRS, GREYC, France

I will introduce lattices and hard problems over lattices, the LWE and SIS problems and explain how they are used to build encryption and signature schemes. Then I will introduce algebraic variants of LWE and SIS and how to build efficient constructions based on those variants.

Mon Aug 14
12:15 PM – 1:15 PM
ITC 307

Lunch


Mon Aug 14
1:15 PM – 2:45 PM
ITC 317

SAC Summer School - Post-quantum cryptography, Part 1

A tutorial on post-quantum cryptography

David Jao, University of Waterloo, Canada


Mon Aug 14
2:45 PM – 3:15 PM
ITC 307

Coffee Break


Mon Aug 14
3:15 PM – 4:30 PM
ITC 317

SAC Summer School - Post-quantum cryptography, Part 2

A tutorial on post-quantum cryptography

David Jao, University of Waterloo, Canada






Tue Aug 15
9:00 AM – 10:30 AM
ITC 317

SAC Summer School - Linear and differential cryptanalysis, Part 1

A tutorial on linear and differential cryptanalysis

Tim Beyne, KU Leuven, Belgium

The first half will cover the basics of linear cryptanalysis: linear approximations, correlation matrices and their properties, linear trails, and some methods for key-recovery.

Tue Aug 15
10:30 AM – 11:00 AM
ITC 307

Coffee Break


Tue Aug 15
11:00 AM – 12:15 PM
ITC 317

SAC Summer School - Linear and differential cryptanalysis, Part 2

A tutorial on linear and differential cryptanalysis

Tim Beyne, KU Leuven, Belgium

The second half will introduce differential cryptanalysis: differentials, differential characteristics, quasidifferential transition matrices and trails, and key-recovery techniques.

Tue Aug 15
12:15 PM – 1:15 PM
ITC 307

Lunch


Tue Aug 15
1:15 PM – 2:45 PM
ITC 317

SAC Summer School - Physical attacks and countermeasures, Part 1

Tim Güneysu, Ruhr-Universität Bochum, Germany


Tue Aug 15
2:45 PM – 3:15 PM
ITC 307

Coffee Break


Tue Aug 15
3:15 PM – 4:30 PM
ITC 317

SAC Summer School - Physical attacks and countermeasures, Part 2

Tim Güneysu, Ruhr-Universität Bochum, Germany






Wed Aug 16
8:30 AM – 9:15 AM
ITC 307

Registration

Pick up your badge


Wed Aug 16
9:15 AM – 9:25 AM
ITC 317

Opening Remarks

by Dr. Benedicenti and Dr. Ghorbani


Wed Aug 16
9:25 AM – 10:25 PM
ITC 317

Invited lecture - Hardware Security - Directions and Challenges

Tim Güneysu, Ruhr-Universität Bochum


Wed Aug 16
10:25 AM – 10:55 AM
ITC 307

Coffee Break


Wed Aug 16
10:55 AM – 12:25 PM
ITC 317

Cryptanalysis of lightweight ciphers

More Balanced Polynomials: Cube Attacks on 810- and 825- Round of Trivium with Practical Complexity
by Hao Lei, Jiahui He, Kai Hu and Meiqin Wangpre-proceeding version (PDF)

A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
by Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun and Willi Meierpre-proceeding version (PDF)

Improving the Rectangle Attack on GIFT-64
by Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang and Zhuohui Fengpre-proceeding version (PDF)


Wed Aug 16
12:25 PM – 1:45 PM
ITC 307

Lunch break

Lunch is included


Wed Aug 16
1:45 PM – 3:15 PM
ITC 317

Side-channel attacks and countermeasures

Mask Compression: High-Order Masking on Memory-Constrained Devices
by Markku-Juhani Saarinen and Mélissa Rossi pre-proceeding version (PDF)

Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme
by Lichao Wu, Guilherme Perin and Stjepan Picekpre-proceeding version (PDF)

Threshold Implementations with Non-Uniform Inputs
by Siemen Dhooghe and Artemii Ovchinnikovpre-proceeding version (PDF)


Wed Aug 16
3:15 PM – 3:45 PM
ITC 307

Coffee Break


Wed Aug 16
3:45 PM – 5:15 PM
ITC 317

Post-quantum constructions

SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
by Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong and MinJune Yipre-proceeding version (PDF)

A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
by Andrea Bassopre-proceeding version (PDF)

Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
by Wei Wei, Min Luo, Zijian Bao, Cong Peng and Debiao Hepre-proceeding version (PDF)


Wed Aug 16
5:15 PM – 6:15 PM
ITC 317

Reception






Thu Aug 17
9:00 AM – 10:00 AM
ITC 317

Stafford Tavares Invited Lecture - Robust and Non-malleable Threshold Schemes, AMD codes and External Difference Families

Doug Stinson

We begin by reviewing the history of robust threshold schemes, which were introduced by Tampa and Woll in 1988. Various solutions over the years have used mathematical structures related to difference sets, including external difference families and algebraic manipulation detection codes. We present several constructions for these structures and discuss their application to robust threshold schemes. Finally, we present some recent (ongoing) work on non-malleable threshold schemes that employ a new variation of AMD codes, namely circular AMD codes.

Thu Aug 17
10:00 AM – 10:30 AM
ITC 307

Coffee Break


Thu Aug 17
10:30 AM – 12:00 AM
ITC 317

Symmetric cryptography and fault attacks

The Random Fault Model
by Siemen Dhooghe and Svetla Nikovapre-proceeding version (PDF)

Probabilistic Related-Key Statistical Saturation Cryptanalysis
by Muzhou Li, Nicky Mouha, Ling Sun and Meiqin Wangpre-proceeding version (PDF)

Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
by Shoichi Hirose and Kazuhiko Minematsupre-proceeding version (PDF)


Thu Aug 17
12:00 PM – 2:00 PM

Lunch break

Lunch is included


Thu Aug 17
2:00 PM – 3:30 PM
ITC 317

Post-quantum analysis and implementations

Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks
by Ruiqi Mi, Haodong Jiang and Zhenfeng Zhangpre-proceeding version (PDF)

Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
by Melanie Jauch and Varun Marampre-proceeding version (PDF)

Fast and Efficient Hardware Implementation of HQC
by Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz and Jakub Szeferpre-proceeding version (PDF)


Thu Aug 17
3:30 PM – 4:00 PM
ITC 307

Coffee Break


Thu Aug 17
4:00 PM – 5:00 PM
ITC 317

Homomorphic encryption

On the Precision Loss in Approximate Homomorphic Encryption
by Anamaria Costache, Benjamin Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie and Rachel Playerpre-proceeding version (PDF)

Secure Function Extensions to Additively Homomorphic Cryptosystems
by Mounika Pratapa and Aleksander Essexpre-proceeding version (PDF)


Thu Aug 17
6:00 PM – 9:00 PM

Banquet at the Wu Conference Centre






Fri Aug 18
9:00 AM – 10:00 AM
ITC 317

Invited lecture - A geometric approach to symmetric-key cryptanalysis

Tim Beyne

I will present recent results that show that linear, differential and integral cryptanalysis are different facets of a single theory. I will introduce the basic principles of this point of view, and show how the choice of base field (complex or p-adic) and basis (diagonalizing an action) correspond to existing techniques. A few applications of this point of view will be given, starting with the analysis of invariants of cryptographic primitives and how they relate to (multiple) linear cryptanalysis. As a second application, I will discuss how the geometric approach leads to quasidifferential trails and how these can be used to avoid statistical independence assumptions in differential cryptanalysis. Finally, I will present preliminary results on an extension of integral cryptanalysis called ultrametric integral cryptanalysis.

Fri Aug 18
10:00 AM – 10:30 AM
ITC 307

Coffee Break


Fri Aug 18
10:30 AM – 11:00 AM
ITC 317

Public-key cryptography

Generalized Implicit Factorization Problem
by Yansong Feng, Abderrahmane Nitaj and Yanbin Panpre-proceeding version (PDF)


Fri Aug 18
11:00 AM – 12:30 PM
ITC 317

Differential cryptanalysis

CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
by Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Rusydi Makarim, Mohamed Rachidi and Sharwan Tiwaripre-proceeding version (PDF)

Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
by Kosei Sakamoto, Ryoma Ito and Takanori Isobepre-proceeding version (PDF)

Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon
by Amirhossein Ebrahimi Moghaddam, David Gerault and Paolo Palmieripre-proceeding version (PDF)