SAC 2016 Slides


Click on paper titles to see slides.

Not all papers have slides available.


Invited Talks           


Physical Attacks and Beyond

Francesco Regazzoni


Post-Quantum Key Exchange for the Internet

Douglas Stebila


Side Channels and Fault Attacks I


Detecting Side Channel Vulnerabilities in Improved Rotating S-box Masking Scheme — Presenting

Four Non-profiled Attacks

Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma and Zongbin Liu


Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms

Tobias Schneider, Amir Moradi, Francois-Xavier Standaert and Tim GŸneysu


Uniform First-Order Threshold Implementations

Tim Beyne, BegŸl Bilgin and Vincent Rijmen


Design and Implementation of Symmetric Cryptography


On the Construction of Hardware-friendly 4x4 and 5x5 S-boxes

Stjepan Picek, Bohan Yang, Vladimir Rozic and Nele Mentens


All the AES You Need on Cortex-M3 and -M4

Peter Schwabe and Ko Stoffelen


Efficient Classical Public Key Cryptography


Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast Kummers

Ping Ngai Chung, Craig Costello and Benjamin Smith


PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA

Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue and Fangyu Zheng


FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors

Patrick Longa


Cryptanalysis of Symmetric Primitives I


New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity

Muhammad Barham, Orr Dunkelman, Stefan Lucks and Marc Stevens


New Differential Bounds and Division Property of LILLIPUT: Block Cipher with Extended Generalized Feistel Network

Yu Sasaki and Yosuke Todo


Cryptanalysis of Simpira

Christoph Dobraunig, Maria Eichlseder and Florian Mendel


Lattice-Based Cryptography


Fixed-Point Arithmetic in SHE Schemes

Anamaria Costache, Nigel P. Smart, Srinivas Vivek and Adrian Waller


A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes

Jean-Claude Bajard, Julien Eynard, Anwar Hasan and Vincent Zucca


Security Considerations for Galois RLWE Families

Hao Chen, Kristin Lauter and Katherine Stange


MACs and PRNGs


Output Masking of Tweakable Even-Mansour can be Eliminated for Message Authentication Code

Shoichi Hirose, Yusuke Naito and Takeshi Sugawara


Improved Algebraic MACs and Practical Keyed-Verification Anonymous Credentials

Amira Barki, Solenn Brunet, Nicolas Desmoulins and Jacques Traore


A Robust and Sponge-Like PRNG with Improved Efficiency

Daniel Hutchinson


Side Channels and Fault Attacks II


Attacking Embedded ECC Implementations Through cmov Side Channels

Erick Nascimento, Lukasz Chmielewski, David Oswald and Peter Schwabe


Lattice Attacks against Elliptic-Curve Signatures with Blinded Scalar Multiplication

Dahmun Goudarzi, Matthieu Rivain and Damien Vergnaud


Loop-Abort Faults on Lattice-Based Fiat-Shamir and Hash-and-Sign Signatures

Thomas Espitau, Beno”t GŽrard, Pierre-Alain Fouque, and Mehdi Tibouchi


Cryptanalysis of Symmetric Primitives II


An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer

Jung Hee Cheon, Hyunsook Hong, Joohee Lee and Jooyoung Lee


Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3

Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent and John Schanck


Efficient Symmetric Primitives


Hold Your Breath, PRIMATEs Are Lightweight

Danilo Šijačić, Andreas Brasen Kidmose, Bohan Yang, Subhadeep Banik, BegŸl Bilgin, Andrey Bogdanov and Ingrid Verbauwhede


Keymill: Side-Channel Resilient Key Generator

Mostafa Taha, Arash Reyhani-Masoleh and Patrick Schaumont


Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy

Conor Patrick, Bilgiday Yuce, Nahid Ghalaty and Patrick Schaumont


Cryptanalysis of Asymmetric Primitives


Sieving for Closest Lattice Vectors (with Preprocessing)

Thijs Laarhoven


Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme

Dustin Moody, Ray Perlner and Daniel Smith-Tone


Solving Discrete Logarithms on a 170-bit MNT Curve by Pairing Reduction

Aurore Guillevic, Franois Morain and Emmanuel ThomŽ