Here is the list of papers accepted to the CT-RSA 2020 conference:

(some authors' affiliations are tentative as they were not yet confirmed by the authors)


  1. TMPS: Ticket-Mediated Password Strengthening, by John Kelsey (NIST, USA and KU Leuven, Belgium), Dana Dachman-Soled (University of Maryland, USA), Sweta Mishra (NIST, USA and Shiv Nadar University, India), and Meltem Sonmez Turan (NIST, USA)
  2. Generic Attack on Iterated Tweakable FX Constructions, by Ferdinand Sibleyras (Inria, France)
  3. Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits, by Pascal Aubry (CEA, LIST, France), Sergiu Carpov (CEA, LIST, France), and Renaud Sirdey (CEA, LIST, France)
  4. My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks, by Siemen Dhooghe (KU Leuven, Belgium) and Svetla Nikova (KU Leuven, Belgium)
  5. Efficient FPGA Implementations of LowMC and Picnic, by Daniel Kales (Graz UT, Austria), Sebastian Ramacher (AIT, Austria), Christian Rechberger (Graz UT, Austria), Roman Walch (Graz UT, Austria), and Mario Werner (Graz UT, Austria)
  6. One-More Assumptions Do Not Help Fiat-Shamir-type Signature Schemes in NPROM, by Masayuki Fukumitsu (Hokkaido Information University, Japan) and Shingo Hasegawa (Tohoku University, Japan)
  7. Better Bootstrapping for Approximate Homomorphic Encryption, by Kyoohyung Han (Coinplug, South Korea) and Dohyeong Ki (Seoul National University, South Korea)
  8. A Consensus Taxonomy in the Blockchain Era, by Juan Garay (Texas A&M, USA) and Aggelos Kiayias (University of Edinburgh and IOHK, UK)
  9. Consensus from Signatures of Work, by Juan Garay (Texas A&M, USA), Aggelos Kiayias (University of Edinburgh and IOHK, UK), and Giorgos Panagiotakos (University of Edinburgh, UK)
  10. Another look at some isogeny hardness assumptions, by Simon-Philipp Merz (Royal Holloway, University of London, UK), Romy Minko (University of Oxford, UK), and Christophe Petit (University of Birmingham, UK)
  11. Overdrive2k: Efficient Secure MPC over Z_{2^k} from Somewhat Homomorphic Encryption, by Emmanuela Orsini (KU Leuven, Belgium), Nigel P. Smart (KU Leuven, Belgium and Uni. Bristol, UK), and Frederik Vercauteren (KU Leuven, Belgium)
  12. Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy, by Gildas Avoine (INSA Rennes, France), Sébastien Canard (Orange Labs, France), and Loïc Ferreira (Orange Labs, France)
  13. Universally Composable Accumulators, by Foteini Baldimtsi (George Mason University, USA), Ran Canetti (Boston University, USA), and Sophia Yakoubov (Boston University, USA, and Aarhus University, Denmark)
  14. Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations, by Nicky Mouha (NIST, USA) and Christopher Celi (NIST, USA)
  15. Cut-and-Choose for Garbled RAM, by Peihan Miao (Visa Research, USA)
  16. Modeling Memory Faults in Signature and Authenticated Encryption Schemes, by Marc Fischlin (TU Darmstadt, Germany) and Felix Günther (ETH Zurich, Switzerland)
  17. How to Construct CSIDH on Edwards Curves, by Tomoki Moriya (The University of Tokyo, Japan), Hiroshi Onuki (The University of Tokyo, Japan), and Tsuyoshi Takagi (The University of Tokyo, Japan)
  18. Traceable Inner Product Functional Encryption, by Xuan Thanh Do (Vietnam National University, Vietnam, and University of Limoges, France), Duong Hieu Phan (University of Limoges, France), and David Pointcheval (ENS, France)
  19. Traceable Ring Signatures with Post-quantum Security, by Hanwen Feng (Beihang University, China), Jianwei Liu (Beihang University, China), Qianhong Wu (Beihang University, China), and Yan-Nan Li (New Jersey IT, USA)
  20. A Fast Characterization Method for Semi-invasive Fault Injection Attacks, by Lichao Wu (TU Delft, The Netherlands), Gerard Ribera (Independent Researcher, The Netherlands), Noemie Beringuier-Boher (Independent Researcher, The Netherlands), Stjepan Picek (TU Delft, The Netherlands)
  21. Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model, by Yuting Xiao (State Key Laboratory of InfoSec and University of Chinese Academy of Sciences, China), Rui Zhang (State Key Laboratory of InfoSec and University of Chinese Academy of Sciences, China), and Hui Ma (State Key Laboratory of InfoSec, China)
  22. FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups, by Jihoon Kwon (Samsung SDS, Korea), Byeonghak Lee (KAIST, Korea), Jooyoung Lee (KAIST, Korea), and Dukjae Moon (Samsung SDS, Korea)
  23. Improved Secure Integer Comparison via Homomorphic Encryption, by Florian Bourse (Orange Labs, France), Olivier Sanders (Orange Labs, France) and Jacques Traoré (Orange Labs, France)
  24. Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes, by Houda Ferradi (Hong Kong Polytechnic , Hong Kong, and Keita Xagawa, NTT, Japan)
  25. A Non-Interactive Shuffle Argument With Low Trust Assumptions, by Antonis Aggelakis (GRNET, Greece), Prastudy Fauzi (Simula UiB, Norway), Georgios Korfatis (GRNET, Greece), Panos Louridas (GRNET, Greece), Foteinos Mergoupis-Anagnou (GRNET, Greece), Janno Siim (University of Tartu, Estonia), and Michal Zajac (Clearmatics, UK)
  26. Cryptanalysis of the Multivariate Encryption Scheme EFLASH, by Morten Øygarden (Simula, Norway), Patrick Felke (Hochschule Emden-Leer, Germany), Håvard Raddum (Simula, Norway), and Carlos Cid (Royal Holloway, University of London, UK)
  27. Universal Forgery Attack against GCM-RUP, by Yanbin Li (Shandong University, China), Gaëtan Leurent (Inria, France), Meiqin Wang (Shandong University, China), Wei Wang (Shandong University, China), Guoyan Zhang (Shandong University, China), and Yu Liu (Shandong University, China)
  28. Policy-Based Sanitizable Signatures, by Kai Samelin (TÜV Rheinland i-sec GmbH, Germany) and Daniel Slamanig (AIT, Austria)