CT-RSA 2017
RSA Conference Cryptographers’ Track
San Francisco, February 14-17, 2017
Held in conjunction with RSA Conference USA
Call for Papers
Original research papers pertaining to all aspects of cryptography are solicited. Topics include but are not limited to:
- Public-key algorithms
- Symmetric-key algorithms
- Hash functions and MAC algorithms
- Random Number Generators
- Cryptographic protocols
- Cryptographic standards
- Efficient implementations
- Elliptic-curve cryptography
- Post-quantum cryptography
- CryptoCurrencies and blockchain
- E-voting
- Cryptanalysis
- Hardware security
- Tamper-resistance
- Side-channel attacks and defenses
- White-box cryptography
CT-RSA 2017 Accepted Papers
Gauss Sieve Algorithm on GPUs
Shang-Yi Yang; Po-Chun Kuo; Bo-Yin Yang; Chen-Mou Cheng
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks
Dingding Jia; Xianhui Lu; Bao Li
Full Disk Encryption: Bridging Theory and Practice
Louiza Khati; Nicky Mouha; Damien Vergnaud
Surnaming Schemes, Fast Verification, and Applications to SGX Technology
Dan Boneh; Shay Gueron
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
Christoph Dobraunig; Eik List
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Subkey Side-Channel Attacks
Liron David; Avishai Wool
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
Noboru Kunihiro; Yuki Takahashi
Encoding-Free ElGamal-type Encryption Schemes on Elliptic Curves
Marc Joye; Benoît Libert
On the Entropy of Oscillator-Based True Random Number Generators
Yuan Ma; Jingqiang Lin; Jiwu Jing
My Traces Learn What You Did in the Dark: Recovering Secret Signals without Key Guesses
Si Gao; Hua Chen; Wenling Wu; Limin Fan; Weiqiong Cao; Xiangliang Ma
An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order
Hannes Gross; Stefan Mangard; Thomas Korak
Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption
Eik List; Mridul Nandi
Weak Keys for AEZ, and the External Key Padding Attack
Bart Mennink
Low-Leakage Secure Search for Boolean Expressions
Fernando Krell; Gabriela Ciocarlie; Ashish Gehani; Mariana Raykova
Ridge-based Profiled Differential Power Analysis
Weijia Wang; Yu Yu; François-Xavier Standaert; Dawu Gu; Sen Xu; Chi Zhang
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme
Jakub Breier; Xiaolu Hou
Hiding Higher-Order Side-Channel Leakage – Randomizing Cryptographic Implementations in Reconfigurable Hardware
Pascal Sasdrich; Amir Moradi; Tim Güneysu
Publish or Perish: A Backward-Compatible Defense against Selfish Mining in Bitcoin
Ren Zhang; Bart Preneel
WEM: A New Family of White-box Block Ciphers Based on the Even-Mansour Construction
Jihoon Cho; Kyu Young Choi; Itai Dinur; Orr Dunkelman; Nathan Keller; Dukjae Moon; Aviya Veidberg
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
Yohei Watanabe; Keita Emura; Jae Hong Seo
Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection
Michele Orru; Emmanuela Orsini; Peter Scholl
Time-Memory Trade-offs for Side-channel Resistant Implementations of Block Ciphers
Praveen Kumar Vadnala
Choosing Parameters for NTRUEncrypt
Jeff Hoffstein; Jill Pipher; John Schanck; Joseph H. Silverman; William Whyte; Zhenfei Zhang
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
Jintai Ding; Saed Alsayigh; Jean Lancrenon; Saraswathi RV; Michael Snook
A Tool Kit for Partial Key Exposure Attacks on RSA
Atsushi Takayasu; Noboru Kunihiro
Important Dates
Submission Deadline: September 3, 2016 — 23:59 PDT (UTC-7)
Notification : November 7, 2016
Final Version of the Paper : November 21, 2016
All papers accepted for presentation will appear in the conference proceedings and will be published in the Lecture Notes in Computer Science series (www.springer.com/lncs). Authors of accepted papers must make their paper available online.
Submission Instructions
All submissions should be uploaded to the WebReview system at https://secure.iacr.org/websubrev/ctrsa2017/submit/ in pdf format by the September 3rd deadline.
Submissions must not substantially duplicate work that any of the authors has published in a journal or in a conference or workshop with proceedings, or has submitted or is planning to submit before the author notification deadline to a journal or other conferences or workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings.
Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Each submission should begin with a title, a short abstract, and a list of keywords. Submissions should be at most 16 pages including the bibliography and should use the Springer LNCS format with no changes to the margins or fonts. Supplementary materials may be appended without a page limit, but reviewers are not required to read them. Submissions should be intelligible and self-contained within the 16 page bound. The same bound will be applied to those papers accepted for publication in the proceedings. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Authors should report any “conflicts” with program committee members listed below. A conflict exists if an author and committee member have the same affiliation or have been co-authors on a paper within the past two years.
Program Committee
Josh Benaloh | Microsoft Research, USA |
Alex Biryukov | University of Luxembourg, Luxembourg |
Chen-Mou Cheng | Osaka University, Japan |
Jeremy Clark | Concordia University, Canada |
Jean Paul Degabriele | Royal Holloway University of London, UK |
Orr Dunkelman | University of Haifa, Israel |
Junfeng Fan | Open Security Research, China |
Henri Gilbert | ANSSI, France |
Tim Güneysu | University of Bremen and DFKI, Germany |
Helena Handschuh (Chair) | Rambus Cryptography Research, USA |
Stanislaw Jarecki | University of California at Irvine, USA |
Thomas Johansson | Lund University, Sweden |
Marc Joye | NXP Semiconductors, USA |
Kwangjo Kim | KAIST, Republic of Korea |
Susan Langford | Hewlett-Packard Company, USA |
Tancrede Lepoint | SRI International, USA |
Stefan Mangard | Graz University of Technology, Austria |
Mitsuru Matsui | Mitsubishi Electric, Japan |
David M’Raïhi | Symphony, USA |
Maria Naya Plasencia | INRIA, France |
Kaisa Nyberg | Aalto University (retired), Finland |
Elisabeth Oswald | University of Bristol, UK |
Raphael Phan | Multimedia University, Malaysia |
David Pointcheval | École Normale Supérieure, France |
Bart Preneel | KULeuven and iMinds, Belgium |
Matt Robshaw | Impinj, USA |
Rei Safavi-Naini | University of Calgary, Canada |
Kazue Sako | NEC, Japan |
Palash Sarkar | Indian Statistical Institute, India |
Nigel Smart | University of Bristol, UK |
Marc Stevens | CWI, The Netherlands |
Willy Susilo | University of Wollongong, Australia |
Huaxiong Wang | Nanyang Technological University, Singapore |
Brecht Wyseur | Nagra, Switzerland |