CT-RSA 2020 Conference Schedule, Feb 25-Feb 28


Tuesday, Feb 25 (9:15am – 10:05pm)

RSA Conference keynote event: The Cryptographers’ Panel, Moscone West Street Level

Cryptographer's panel on cybersecurity and our increasingly digital society.

Participants: Whitfield Diffie (Cryptomathic), Arvind Narayanan (Princeton University), Tal Rabin (Algorand Foundation), Zulfikar Ramzan (RSA), Ronald Rivest (Massachusetts Institute of Technology), Adi Shamir (The Weizmann Institute, Israel)

Tuesday, Feb 25 (11am – 4:30pm)

morning sessions:

Symmetric Key Cryptanalysis (11am-11:50am)

1. Generic Attack on Iterated Tweakable FX Constructions, by Ferdinand Sibleyras (Inria, France)

2. Universal Forgery Attack against GCM-RUP, by Yanbin Li (Shandong University, China), Gaëtan Leurent (Inria, France), Meiqin Wang (Shandong University, China), Wei Wang (Shandong University, China), Guoyan Zhang (Shandong University, China), and Yu Liu (Shandong University, China). Paper to be presented by: Ferdinand Sibleyras

afternoon sessions:

Security against Fault Attacks (1pm-1:50pm)

3. My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks, by Siemen Dhooghe (KU Leuven, Belgium) and Svetla Nikova (KU Leuven, Belgium)

4. Modeling Memory Faults in Signature and Authenticated Encryption Schemes, by Marc Fischlin (TU Darmstadt, Germany) and Felix Günther (ETH Zurich, Switzerland)

Cryptanalysis and Cipher Design (2:20pm-3:10pm)

5. Cryptanalysis of the Multivariate Encryption Scheme EFLASH, by Morten Øygarden (Simula, Norway), Patrick Felke (University of Applied Sciences Emden-Leer, Germany), Håvard Raddum (Simula, Norway), and Carlos Cid (Royal Holloway University of London, UK)

6. FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups, by Jihoon Kwon (Samsung SDS, Korea), Byeonghak Lee (KAIST, Korea), Jooyoung Lee (KAIST, Korea), and Dukjae Moon (Samsung SDS, Korea)

Symmetric Key Cryptanalysis, continued (3:40pm-4:30pm)

7. Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations, by Nicky Mouha (NIST, USA) and Christopher Celi (NIST, USA)

8. A Fast Characterization Method for Semi-invasive Fault Injection Attacks, by Lichao Wu (TU Delft, The Netherlands), Gerard Ribera (Independent Researcher, The Netherlands), Noemie Beringuier-Boher (Independent Researcher, The Netherlands), Stjepan Picek (TU Delft, The Netherlands)


Speaker's Reception, Marriott Hotel, The View Lounge, 39th floor (5:30pm– 8:00pm)

All CT-RSA Speakers are invited to the RSA Conference speaker's reception.


Wednesday, Feb 26 (8am – 3:40pm)

morning sessions:

Key Exchange (8:00am-8:50am)

9. Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model, by Yuting Xiao [pre-recorded talk] (State Key Laboratory of InfoSec and University of Chinese Academy of Sciences, China), Rui Zhang (State Key Laboratory of InfoSec and University of Chinese Academy of Sciences, China), and Hui Ma (State Key Laboratory of InfoSec, China)

10. Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy, by Gildas Avoine (INSA Rennes, France), Sébastien Canard (Orange Labs, France), and Loïc Ferreira (Orange Labs, France)

Password Strengthening and Secure Computation (9:20am-10:10am)

11. TMPS: Ticket-Mediated Password Strengthening, by John Kelsey (NIST, USA and KU Leuven, Belgium), Dana Dachman-Soled (University of Maryland, USA), Sweta Mishra (NIST, USA and Shiv Nadar University, India), and Meltem Sonmez Turan (NIST, USA)

12. Overdrive2k: Efficient Secure MPC over Z_{2^k} from Somewhat Homomorphic Encryption, by Emmanuela Orsini (KU Leuven, Belgium), Nigel P. Smart (KU Leuven, Belgium and University of Bristol, UK), and Frederik Vercauteren (KU Leuven, Belgium)

Space left open for main RSA Conference talk (expected from around 10:30am-12:00)

afternoon sessions:

Cryptographers’ Panel (1:30pm-2:20pm):

Panel Title: The Never-Ending Crypto Wars

Panelists: Susan Landau (Tufts University, USA), Erica Portnoy (Electronic Frontier Foundation, USA), Bart Preneel [moderator] (KU Leuven and Tioga Capital Partners, Belgium), Adi Shamir (The Weizmann Institute, Israel)

Blockchain Cryptography (2:50pm-3:40pm)

13. A Consensus Taxonomy in the Blockchain Era, by Juan Garay (Texas A&M, USA) and Aggelos Kiayias (University of Edinburgh and IOHK, UK)

14. Consensus from Signatures of Work, by Juan Garay (Texas A&M, USA), Aggelos Kiayias (University of Edinburgh and IOHK, UK), and Giorgos Panagiotakos (University of Edinburgh, UK)


Thursday, Feb 27 (8am – 3:40pm)

morning sessions:

Fully Homomorphic Encryption (8:00am-8:50am)

15. Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits, by Pascal Aubry (CEA, LIST, France), Sergiu Carpov (CEA, LIST, France), and Renaud Sirdey (CEA, LIST, France)

16. Better Bootstrapping for Approximate Homomorphic Encryption, by Kyoohyung Han (Coinplug, South Korea) and Dohyeong Ki (Seoul National University, South Korea)

FHE-MPC and Post-Quantum Crypto (9:20am-10:10am)

17. Improved Secure Integer Comparison via Homomorphic Encryption, by Florian Bourse (ENS, France), Olivier Sanders (Orange Labs, France), and Jacques Traoré (Orange Labs, France)

18. Efficient FPGA Implementations of LowMC and Picnic, by Daniel Kales (Graz UT, Austria), Sebastian Ramacher (AIT, Austria), Christian Rechberger (Graz UT, Austria), Roman Walch (Graz UT, Austria), and Mario Werner (Graz UT, Austria)

Space left open for main RSA Conference talk (expected from around 10:30am to noon)

afternoon sessions:

Post-Quantum Crypto (1:30pm-2:20pm)

19. Traceable Ring Signatures with Post-quantum Security, by Hanwen Feng (Beihang University, China), Jianwei Liu (Beihang University, China), Qianhong Wu (Beihang University, China), and Yan-Nan Li (New Jersey IT, USA)

20. Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes, by Houda Ferradi (Hong Kong Polytechnic , Hong Kong, and Keita Xagawa, NTT, Japan)

Mathematical Advances in Cryptography (2:50pm-3:40pm)

21. Another look at some isogeny hardness assumptions, by Simon-Philipp Merz (Royal Holloway, University of London, UK), Romy Minko (University of Oxford, UK), and Christophe Petit (University of Birmingham, UK)

22. How to Construct CSIDH on Edwards Curves, by Tomoki Moriya (University of Tokyo, Japan), Hiroshi Onuki (University of Tokyo, Japan), and Tsuyoshi Takagi (University of Tokyo, Japan)

Friday, Feb 28 (8:30am – noon)

all-morning sessions:

Public Key Cryptography: applications part 1 (8:30am-9:20am)

23. Policy-Based Sanitizable Signatures, by Kai Samelin (TÜV Rheinland i-sec GmbH, Germany) and Daniel Slamanig (AIT, Austria)

24. Traceable Inner Product Functional Encryption, by Xuan Thanh Do (Vietnam National University, Vietnam, and University of Limoges, France), Duong Hieu Phan (University of Limoges, France), and David Pointcheval (ENS, France)

Public Key Cryptography: theory (9:50am-10:40am)

25. One-More Assumptions Do Not Help Fiat-Shamir-type Signature Schemes in NPROM, by Masayuki Fukumitsu (Hokkaido Information University, Japan) and Shingo Hasegawa (Tohoku University, Japan) Paper to be presented by: Stanislaw Jarecki

26. Cut-and-Choose for Garbled RAM, by Peihan Miao (Visa Research, USA)

Public Key Cryptography: applications part 2 (11:10am-12:00)

27. Universally Composable Accumulators, by Foteini Baldimtsi (George Mason University, USA), Ran Canetti (Boston University, USA), and Sophia Yakoubov (Boston University, USA, and Aarhus University, Denmark)

28. A Non-Interactive Shuffle Argument With Low Trust Assumptions, by Antonis Aggelakis (GRNET, Greece), Prastudy Fauzi (Simula UiB, Norway), Georgios Korfatis (GRNET, Greece), Panos Louridas (GRNET, Greece), Foteinos Mergoupis-Anagnou (GRNET, Greece), Janno Siim (University of Tartu, Estonia), and Michal Zajac (Clearmatics, UK).