Skip to main content

European Integrated Research Training Network on Advanced Cryptographic Technologies for the Internet of Things and the Cloud

Deliverables

Career Development Plan Y1

Preliminary Fellow Report Y1

Half way Review of Dissemination, Press and Outreach Strategy

Intermediate Status of dissemination and outreach

Career Development Plan Y3

Preliminary Fellow Report Y3

Yearly report on training Y1

Written evaluation on training activities

Final Report on Dissemination, Press and Outreach Strategy

Final status of dissemination and outreach activities

Dissemination, Press and Outreach Strategy

Strategy on dissemination and outreach

Progress Report

the Progress report M13 relates to the milestone on completion of the recruitment phase and includes general update on the project progress (technical implementation and management).

Tech report on Implementation results

Tech report on Implementation results

Yearly report on training Y3

Written evaluation on training activities

Awarding of doctoral degrees

List of ESRs with doctoral degrees

Draft Periodic Report

This report includes general update on the project progress (technical implementation and management) and is a preparatory document for the project review meeting.

Yearly report on training Y2

Written evaluation on training activities

Yearly report on training Y4

Written evaluation on training activities

Technical Report on Requirements and design constraints for IoT and Cloud

Requirements and design constraints for IoT and Cloud

Career Development Plan Y2

Preliminary Fellow Report Y2

Overall Recruitment

Recruitment of the ESRs by all beneficiaries

Supervisory Board of the network

The Supervisory Board as the executive body of the ETN; The Supervisory Board (SB) will be responsible for the overall strategic and scientific management of the network and reports directly to the GA. The SB will be composed of the coordinator, the supervisors, the co-supervisors and external stakeholders from industry and government. The diversity of this board is intended to ensure ongoing relevance of the Network and that integration benefits from the expertise of all relevant parties. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions. The annual meetings of supervisory board, general assembly meeting and fellow council meeting will be co-located with network wide training events in order to keep travel overhead low. External stakeholders that will serve on the Supervisory Board include Claire Vishik (Intel), Moti Yung (Google), and Kaisa Nyberg (Aalto University); in addition a representative from ENISA (European Network and Information Security Agency) will be invited. The Supervisory Board oversees integration of the research goals within the project and provides advice on all strategic issues relevant to both scientific and administrative aspects. The Supervisory Board will fulfil other specific tasks including the initiation, coordination and organization of the workpackages and the support of the Coordinator in its tasks. It will also monitor and coordinate all planned trainings events within the ITN. The Supervisory Board will be responsible for adjusting the work plan if there are any disruptions such as the recruitment not going to according to a plan, or fellow leaving the network and so on. The supervisory board will meet once per year and will be in contact by electronic means for intermediate status reports and discussions.

ESRs declarations

Collecting all ESR declarations

Publications

Faster SeaSign signatures through improved rejection sampling

Author(s): Thomas Decru and Lorenz Panny and Frederik Vercauteren
Published in: PQCrypto 2019, 2019, Page(s) to appear

CSIDH: An Efficient Post-Quantum Commutative Group Action

Author(s): Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, Joost Renes
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 395-427
DOI: 10.1007/978-3-030-03332-3_15

Low-Communication Parallel Quantum Multi-Target Preimage Search

Author(s): Gustavo Banegas, Daniel J. Bernstein
Published in: Selected Areas in Cryptography – SAC 2017, Issue 10719, 2018, Page(s) 325-335
DOI: 10.1007/978-3-319-72565-9_16

HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction

Author(s): Daniel J. Bernstein, Leon Groot Bruinderink, Tanja Lange, Lorenz Panny
Published in: Progress in Cryptology – AFRICACRYPT 2018, Issue 10831, 2018, Page(s) 203-216
DOI: 10.1007/978-3-319-89339-6_12

Fast Homomorphic Evaluation of Deep Discretized Neural Networks

Author(s): Florian Bourse, Michele Minelli, Matthias Minihold, Pascal Paillier
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 483-512
DOI: 10.1007/978-3-319-96878-0_17

Assessing the Feasibility of Single Trace Power Analysis of Frodo

Author(s): Joppe W. Bos, Simon Friedberger, Marco Martinoli, Elisabeth Oswald, Martijn Stam
Published in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 216-234
DOI: 10.1007/978-3-030-10970-7_10

FHE Circuit Privacy Almost for Free

Author(s): Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee
Published in: Advances in Cryptology – CRYPTO 2016, Issue 9815, 2016, Page(s) 62-89
DOI: 10.1007/978-3-662-53008-5_3

Foundational (Co)datatypes and (Co)recursion for Higher-Order Logic

Author(s): Julian Biendarra, Jasmin Christian Blanchette, Aymeric Bouzy, Martin Desharnais, Mathias Fleury, Johannes Hölzl, Ondřej Kunčar, Andreas Lochbihler, Fabian Meier, Lorenz Panny, Andrei Popescu, Christian Sternagel, René Thiemann, Dmitriy Traytel
Published in: Frontiers of Combining Systems, Issue 10483, 2017, Page(s) 3-21
DOI: 10.1007/978-3-319-66167-4_1

MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

Author(s): Ralph Ankele, Florian Böhl, Simon Friedberger
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 381-399
DOI: 10.1007/978-3-319-93387-0_20

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

Author(s): Ralph Ankele, Stefan Kölbl
Published in: Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers, Issue 11349, 2019, Page(s) 163-190
DOI: 10.1007/978-3-030-10970-7_8

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

Author(s): Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III, Issue 11274, 2018, Page(s) 86-117
DOI: 10.1007/978-3-030-03332-3_4

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly

Author(s): Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 275-305
DOI: 10.1007/978-3-319-96884-1_10

Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware

Author(s): Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens
Published in: Progress in Cryptology – AFRICACRYPT 2016, Issue 9646, 2016, Page(s) 147-166
DOI: 10.1007/978-3-319-31517-1_8

Related-Key Impossible-Differential Attack on Reduced-Round Skinny

Author(s): Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim, Gaoli Wang
Published in: Applied Cryptography and Network Security, Issue 10355, 2017, Page(s) 208-228
DOI: 10.1007/978-3-319-61204-1_11

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer

Author(s): Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – ASIACRYPT 2017, Issue 10624, 2017, Page(s) 598-628
DOI: 10.1007/978-3-319-70694-8_21

Robust Encryption, Extended

Author(s): Rémi Géraud, David Naccache, Răzvan Roşie
Published in: Topics in Cryptology – CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4–8, 2019, Proceedings, Issue 11405, 2019, Page(s) 149-168
DOI: 10.1007/978-3-030-12612-4_8

More Efficient Constant-Round Multi-party Computation from BMR and SHE

Author(s): Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez
Published in: Theory of Cryptography, Issue 9985, 2016, Page(s) 554-581
DOI: 10.1007/978-3-662-53641-4_21

Adaptive-Secure VRFs with Shorter Keys from Static Assumptions

Author(s): Răzvan Roşie
Published in: Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings, Issue 11124, 2018, Page(s) 440-459
DOI: 10.1007/978-3-030-00434-7_22

Twisting Lattice and Graph Techniques to Compress Transactional Ledgers

Author(s): Rémi Géraud, David Naccache, Răzvan Roşie
Published in: Security and Privacy in Communication Networks, Issue 238, 2018, Page(s) 108-127
DOI: 10.1007/978-3-319-78813-5_6

Differential Cryptanalysis of Round-Reduced Sparx-64/128

Author(s): Ralph Ankele, Eik List
Published in: Applied Cryptography and Network Security, Issue 10892, 2018, Page(s) 459-475
DOI: 10.1007/978-3-319-93387-0_24

Faster Secure Multi-party Computation of AES and DES Using Lookup Tables

Author(s): Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
Published in: Applied Cryptography and Network Security, Issue 10355, 2017, Page(s) 229-249
DOI: 10.1007/978-3-319-61204-1_12

TinyKeys: A New Approach to Efficient Multi-Party Computation

Author(s): Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 3-33
DOI: 10.1007/978-3-319-96878-0_1

Designing Efficient Dyadic Operations for Cryptographic Applications

Author(s): Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini
Published in: Journal of Mathematical Cryptology, Issue to appear, 2019, ISSN 1862-2976

DAGS: Key encapsulation using dyadic GS codes

Author(s): Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane N’diaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini
Published in: Journal of Mathematical Cryptology, Issue 12/4, 2018, Page(s) 221-239, ISSN 1862-2976
DOI: 10.1515/jmc-2018-0027

A new class of irreducible pentanomials for polynomial-based multipliers in binary fields

Author(s): Gustavo Banegas, Ricardo Custódio, Daniel Panario
Published in: Journal of Cryptographic Engineering, 2019, ISSN 2190-8508
DOI: 10.1007/s13389-018-0197-6

Arithmetic Considerations for Isogeny Based Cryptography

Author(s): Joppe Bos, Simon Friedberger
Published in: IEEE Transactions on Computers, 2018, Page(s) 1-1, ISSN 0018-9340
DOI: 10.1109/TC.2018.2851238

New classes of complete permutation polynomials

Author(s): Lisha Li, Chaoyun Li, Chunlei Li, Xiangyong Zeng
Published in: Finite Fields and Their Applications, Issue 55, 2019, Page(s) 177-201, ISSN 1071-5797
DOI: 10.1016/j.ffa.2018.10.001

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Author(s): Ankele, Ralph; Dobraunig, Christoph; Guo, Jian; Lambooij, Eran; Gregor, Leander; Todo, Yosuke
Published in: IACR Transactions on Symmetric Cryptology 1–43, Issue 1, 2019, ISSN 2519-173X
DOI: 10.5281/zenodo.2593578

Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

Author(s): Lacharité, M.-S; Paterson, K.
Published in: IACR Transactions on Symmetric Cryptology 2018(1) 277-313, Issue 1, 2018, ISSN 2519-173X
DOI: 10.13154/tosc.v2018.i1.277-313

Binary sequences with period N and nonlinear complexity N − 2

Author(s): Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang
Published in: Cryptography and Communications, 2018, ISSN 1936-2447
DOI: 10.1007/s12095-018-0324-3

A Methodology for the Characterisation of Leakages in Combinatorial Logic

Author(s): Guido Bertoni, Marco Martinoli, Maria Chiara Molteni
Published in: Journal of Hardware and Systems Security, Issue 1/3, 2017, Page(s) 269-281, ISSN 2509-3428
DOI: 10.1007/s41635-017-0015-0

Impossible Meet-in-the-middle Fault Analysis on the LED Lightweight Cipher in VANETs

Author(s): Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya
Published in: SCIENCE CHINA Information Sciences, Issue 1, 2018, ISSN 1869-1919
DOI: 10.5281/zenodo.2593621

Security of BLS and BGLS signatures in a multi-user setting

Author(s): Marie-Sarah Lacharité
Published in: Cryptography and Communications, Issue 10/1, 2018, Page(s) 41-58, ISSN 1936-2447
DOI: 10.1007/s12095-017-0253-6

Permutation polynomials (x pm − x + δ) s1 + (x pm − x + δ) s2 + x over Fp n

Author(s): Li, Lisha; Wang, Shi; Li, Chaoyun; Zeng, Xiangyong
Published in: Finite Fields and Their Applications 51(May 2018) 31-61, Issue 1, 2018, ISSN 1071-5797
DOI: 10.5281/zenodo.2594493

Strong 8-bit Sboxes with efficient masking in hardware extended version

Author(s): Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in: Journal of Cryptographic Engineering, Issue 7/2, 2017, Page(s) 149-165, ISSN 2190-8508
DOI: 10.1007/s13389-017-0156-7

Ciphertext-only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things

Author(s): Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
Published in: IEEE Transactions on Dependable and Secure Computing, 2018, Page(s) 1-1, ISSN 1545-5971
DOI: 10.1109/TDSC.2018.2857770

Security of Symmetric Primitives under Incorrect Usage of Keys

Author(s): Farshim, Pooya; Orlandi, Claudio; Roşie, Răzvan
Published in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 449-473, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i1.449-473

Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices

Author(s): Chaoyun Li and Qingju Wang
Published in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 129-155, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i1.129-155

A Note of 5-bit Quadratic Permutations' Classification

Author(s): Dušan Božilov, Begül Bilgin, Hacı Ali Sahin
Published in: IACR Transactions on Symmetric Cryptology, Issue 1, 2017, Page(s) 398-404, ISSN 2519-173X
DOI: 10.13154/tosc.v2017.i1.398-404

Processing Encrypted Data Using Homomorphic Encryption

Author(s): Barnett, Anthony; Bonte, Charlotte; Bootland, Carl; Bos, Joppe W.; Castryck, Wouter; Costache, Anamaria; Goubin, Louis; Iliashenko, Ilia; Lepoint, Tancrède; Minelli, Michele; Paillier, Pascal; Smart, Nigel P.; Vercauteren, Frederik; Vivek, Srinivas; Waller, Adrian
Published in: Issue 1, 2017
DOI: 10.5281/zenodo.2594695

Glitch-Resistant Masking Schemes as Countermeasure Against Fault Sensitivity Analysis

Author(s): Victor Arribas, Thomas De Cnudde, Danilo Sijacic
Published in: 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 2018, Page(s) 27-34
DOI: 10.1109/FDTC.2018.00013

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

Author(s): Grubbs, Paul; Lacharité, Marie-Sarah; Minaud, Brice; Paterson, Kenneth G.
Published in: 480-496, Issue 1, 2019
DOI: 10.5281/zenodo.2594531

Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

Author(s): Poddebniak, Damian; Dresen, Christian; Müller, Jens; Ising, Fabian; Schinzel, Sebastian; Friedberger, Simon; Somorovsky, Juraj; Somorovsky, Juraj Ruhr University Bochum Schwenk, Jörg
Published in: Issue 1, 2018
DOI: 10.5281/zenodo.2594631

Pump up the Volume - Practical Database Reconstruction from Volume Leakage on Range Queries

Author(s): Paul Grubbs, Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 315-331
DOI: 10.1145/3243734.3243864

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

Author(s): Marie-Sarah Lacharite, Brice Minaud, Kenneth G. Paterson
Published in: 2018 IEEE Symposium on Security and Privacy (SP), 2018, Page(s) 297-314
DOI: 10.1109/SP.2018.00002

Fast Arithmetic Modulo 2xpy±1

Author(s): Bos, Joppe W.; Friedberger, Simon
Published in: Issue 1, 2017
DOI: 10.5281/zenodo.2594671

Lattice-Based zk-SNARKs from Square Span Programs

Author(s): Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Page(s) 556-573
DOI: 10.1145/3243734.3243845

Towards Efficient and Automated Side Channel Evaluations at Design Time

Author(s): Danilo Šijačić, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
Published in: Kalpa Publications in Computing volume 7, 2018, Page(s) 16--1
DOI: 10.29007/mbf3

Strong 8-bit Sboxes with Efficient Masking in Hardware

Author(s): Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider
Published in: CHES 2016, Lecture Notes in Computer Science, Issue 9813, 2016, Page(s) 171-193
DOI: 10.1007/978-3-662-53140-2_9

A Methodology for the Characterisation of Leakages in Combinatorial Logic

Author(s): Guido Bertoni, Marco Martinoli
Published in: SPACE 2016, Lecture Notes in Computer Science, Issue 10076, 2016, Page(s) 363-382
DOI: 10.1007/978-3-319-49445-6_21