Accepted Papers


  • Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay. Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
  • Sikhar Patranabis, Yash Shrivastava and Debdeep Mukhopadhyay. Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing
  • Liqiang Peng, Lei Hu, Yao Lu, Santanu Sarkar, Jun Xu and Zhangjie Huang. Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents
  • Kyung-Ah Shim, Cheol-Min Park and Yu-Jin Baek. Lite-Rainbow: Lightweight Signature Schemes based on Multivariate Quadratic Equations and Their Secure Implementations
  • Yanqing Yao and Zhoujun Li. Non-Malleable Extractors with Shorter Seeds and Their Applications
  • Subhadeep Banik. Some results on Sprout
  • Nasour Bagheri. Linear Cryptanalysis of Reduced-Round SIMECK Variants
  • Haiyang Xue, Yamin Liu, Xianhui Lu and Bao Li. Lossy Projective Hashing and Its Applications
  • Ege Gulcan, Aydin Aysu and Patrick Schaumont. BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware
  • Mahmed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri and Praveen Gauravaram. SIMON 32 and 48
  • Thierry Berger, Céline Blondeau and Marine Minier. Some Results using the Matrix Methods on Impossible, Integral and Zero-Correlation Distinguishers for Feistel-like Ciphers
  • Subhadeep Banik and Andrey Bogdanov. Cryptanalysis of two fault countermeasure schemes
  • Nasour Bagheri, Navid Ghaedi Bardeh and Somitra Sanadhya. Differential Fault Analysis of SHA-3
  • Annelie Heuser, Olivier Rioul and Sylvain Guilley. A Key to Success: Success Exponents for Side-Channel Distinguishers
  • Akshima Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel and Somitra Kumar Sanadhya. Improved 7 and 8-round Attacks on ARIA192/256
  • Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann and Daniele Venturi. (De-)Constructing TLS 1.3
  • Brian Koziel, Reza Azarderakhsh and Mehran Mozaffari Kermani. Low-Resource and Fast Binary Edwards Curves Cryptography Using Gaussian Normal Basis
  • Huiling Zhang and Wenling Wu. Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
  • Maciej Skorski. Efficiently Simulating High Min-Entropy Sources in the Presence of Side Information

 

Important Dates

Submission deadline:
Monday, 13 July 2015 at 5pm GMT (9:30pm IST)
Monday, 20 July 2015 at 5pm GMT (9:30pm IST)

Notification to authors:
Monday, 7 Sept 2015
Sunday, 13 Sept 2015

Proceedings version due:
Friday, 18 Sept 2015
Thursday, 24 Sept 2015

Conference Dates: December 06 - 09, 2015

Updates

The conference program is now available

List of invited speakers is now available

List of accepted papers is now available

Sponsors