13th International Conference on Cryptology
AFRICACRYPT 2022
July 18-20, 2022 - Fes, Morocco
Important DatesLatest News
Conference Proceedings are published. Find them
here.
The proceedings will be available for free until November 14, 2022.
The presentations of the invited talks are here and here.
Conference Program is announced. Check it here.
Call for posters is announced. Read more here.
About AfricaCrypt Conference
Important Dates
- Paper Submission deadline :
February 25, 2022March 6, 2022 (Deadline Extended) - Paper Acceptance notification :
April 22, 2022April 29, 2022 (Deadline Extended) - Camera-ready version :
May 12, 2022May 19, 2022 (Deadline Extended) - Poster submission deadline :
June 1, 2022June 12, 2022 (Deadline Extended) - Poster acceptance notification :
June 8, 2022June 20, 2022 (Deadline Extended) - Registration for accepted posters deadline : July 1, 2022
- Conference: July 18-20, 2022
Registration is open
Important Information
AfricaCrypt 2022 is co-organized by Faculty of Sciences, Sidi Mohamed Ben Abdellah University, Fes, Morocco, in cooperation with the International Association for Cryptologic Research (IACR).
Registration is open.
The proceedings are published by Springer's Lecture Notes in Computer Science (LNCS) and they can be accessed here
Keynote Speakers
Lilya Budaghyan - University of Bergen, Norway
Lilya Budaghyan is a professor and the head of the Selmer Center in Secure Communication, Department of Informatics, University of Bergen, Norway. She received her Ph.D. degree from the University of Magdeburg, Germany, in 2005, and the habilitation degree from the University of Paris 8, France, in 2013. Her main research interests include cryptographic Boolean functions and discrete structures and their applications. She also conducted her research at Yerevan State University (Armenia), the University of Trento (Italy) and Telecom ParisTech (France). She was a recipient of the Trond Mohn Foundation Award in 2016, the Young Research Talent Grant from the Norwegian Research Council in 2014, a Postdoctoral Fellowship Award from the Foundation of Mathematical Sciences of Paris in 2012, and the Emil Artin Junior Prize in Mathematics in 2011. Since 2018, she has been a member of the Norwegian Academy of Technological Sciences (NTVA).
Talk title: In search of equivalence relations for cryptographic Boolean functions ( slides )
Talk abstract: Boolean functions are among the most fundamental objects in pure and applied mathematics and computer science. In particular, in cryptography block ciphers are designed by appropriate composition of Boolean functions, and the security of a block cipher depends on special Boolean functions called S-boxes.
The two main cryptographic properties of S-boxes, differential uniformity and nonlinearity, measure the resistance of S-boxes to the two most powerful classical attacks, differential and linear cryptanalyses, respectively. Equivalence relations preserving differential uniformity and nonlinearity divide the set of all functions into classes. Among such equivalence relations are affine, extended affine and CCZ-equivalences. Studying these equivalence relations and finding new ones is important for the following two reasons: first, they can be powerful construction methods providing for each function a huge class of functions with the same properties, and, second, instead of checking invariant properties for all functions, it is enough to check only one in each class.
In the present talk we discuss known equivalence relations of cryptographic functions and possible ways for finding new such equivalence relations.
Matthieu Rivain - Cryptoexperts, France
Matthieu is a researcher and entrepreneur in cryptography. He has conducted his PhD study at the University of Luxembourg between 2006 and 2009 while being a cryptography engineer at Oberthur (now Idemia). In 2010, Matthieu joined CryptoExperts, a young technology and service company in cryptography, which he today leads as CEO. Matthieu’s research interests cover several aspects of applied cryptography such as secure cryptographic implementations, side-channel attacks, elliptic-curve cryptography, white-box cryptography, and more recently zero-knowledge proofs. Matthieu has been an active member of IACR since 2007, and in particular of the CHES conference, which he co-organised in 2015 (as general co-chair) and in 2018 (as program co-chair).
Talk title: A quest for provable security against side-channel attacks ( slides )
Talk abstract: We live in a world in which cryptography has become ubiquitous. Devices around us are constantly processing cryptographic computations to ensure the confidentiality and the authenticity of our communications. Over the last forty years, the scientific community and the industry have converged towards the paradigm of provable security for cryptographic algorithms and protocols: they should come with a security proof formally stating their security under well-studied computational hardness assumptions.
In the late 90’s, it was shown that the implementations of (provably secure) cryptosystems could be practically broken by side-channel attacks which exploit their physical leakage, such as their execution time, power consumption, or electromagnetic emanation. While a lot of progress was made over the last decades to design practical countermeasures against side-channel attacks, achieving provable security for cryptographic implementations under this threat is still a work in progress.
In this talk, I will present on-going research efforts to achieve this goal. We will see how to formally model the side channel leakage under the assumption that it is somehow noisy. We will further study the masking technique whose principle is to apply secret sharing at the computation level. We will see how to reason about the security of masking in different formal models and will discuss the remaining gaps to be closed in the quest for provable security against side-channel attacks.
Conference Program
Below you'll find the program for AfricaCrypt 2022. We'll keep this page regularly updated with all new speakers and sessions, so be sure to keep checking in!
Note: All timedates are displayed in local time Fes, Morocco, GTM+1.
Registration
Royal Mirage hotel
Registration
Conference venue
Opening Ceremony
Session 1: Symmetric cryptography
Chair: Olivier Blazy
Construction of Recursive MDS Matrices Using DLS Matrices
Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta
FUTURE: A Lightweight Block Cipher Using An Optimal Diffusion Matrix
Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta
A Small GIFT-COFB: Lightweight Bit-Serial Architectures
Andrea Caforio, Daniel Collins, Subhadeep Banik and Francesco Regazzoni
Coffee break
Keynote Talk 1 by Lilya Budaghyan
Chair: Joan Daemen
In search of equivalence relations for cryptographic Boolean functions
Keynote Speaker: Lilya Budaghyan
Lunch break
Session 2: Attribute and identity based encryption
Chair: Lilya Budaghyan
Identity Based Encryption in DDH hard Groups
Olivier Blazy and Saqib A. Kakvi
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks
Marloes Venema and Greg Alpár
Session 3: Poster Presentations
Chair: Stjepan Picek
Coffee break and Poster Session
Session 4: Symmetric cryptanalysis
Chair: Lhoussain El Fadil
Cryptanalysis of Reduced Round SPEEDY
Raghvendra Rohit and Santanu Sarkar
And Rijndael? Automatic Related-key Differential Analysis of Rijndael
David Gérault, Marine Minier, Loïc Rouquette and Christine Solnon
Breaking Panther
Christina Boura, Rachelle Heim Boissier and Yann Rotella
Registration
Conference venue
Session 5: Post-quantum cryptography
Chair: Abderrahmane Nitaj
Solving the Learning Parity with Noise Problem using Quantum Algorithms
Bénédikt Tran and Serge Vaudenay
An estimator for the hardness of the MQ problem
Javier Verbel, Emanuelle Bellini, Rusydi H. Makarim and Carlo Sanna
Recovering Rainbow's Secret Key with a First- Order Fault Attack
Thomas Aulbach, Tobias Kovats, Juliane Krämer and Soundes Marzougui
Dilithium for Memory Constrained Devices
Joppe Bos, Joost Renes and Daan Sprenkels
Coffee break and Poster session
Keynote Talk 2 by Matthieu Rivain
Chair: Lejla Batina
A quest for provable security against side-channel attacks
Keynote Speaker: Matthieu Rivain
Lunch break
Guided visit of Old Medina
Gala dinner
Registration
Conference venue
Session 6: Selected topics of cryptography I (online)
Chair: Joan Daemen
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards
Rikuo Haga, Yuichi Hayashi, Daiki Miyahara and Takaaki Mizuki
Automated Key Recovery Attacks on Round- Reduced Orthros
Muzhou Li, Ling Sun and Meiqin Wang
EHNP Strikes Back: Analyzing SM2 Implementations
Jinzheng Cao, Qingfeng Cheng and Jian Weng
Coffee break and Poster session
Session 7: Side-channel attacks and foundations
Chair: Serge Vaudenay
TransNet: Shift Invariant Transformer Network for Power Attack
Suvadeep Hajra, Sayandeep Saha, Manaar Alam and Debdeep Mukhopadhyay
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA
Azade Rezaeezade, Guilherme Perin and Stjepan Pice
A Random Oracle for All of Us
AMarc Fischlin, Felix Rohrbach and Tobias Schmalz
Lunch break
Session 8: Public key (crypt)analysis
Chair: Hussain Benazza
DiSSECT : Distinguisher of Standard & Simulated Elliptic Curves via Traits
Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys and Vashek Matyas
Co-factor clearing and subgroup membership testing on pairing-friendly curves
Youssef El Housni, Aurore Guillevic and Thomas Piellard
A Generalized Attack on the Multi-Prime Power RSA
Abderrahmane Nitaj, Willy Susilo and Joseph Tonien
Finding Low-Weight Polynomial Multiples Using the Rho Method
Laila El Aimani
Coffee break and Poster session
Session 9: Selected topics of cryptography II
Chair: Lejla Batina
A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption
Mónica P. Arenas, Muhammed A. Bingol, Huseyin Demirci, Georgios Fotiadis and Gabriele Lenzini
Lattice-Based Inner Product Argument (online)
Veronika Kuchta, Gaurav Sharma and Rajeev Anand Sahu
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs (online)
Ruben Niederhagen, Johannes Roth and Julian Wälde
Concluding Remarks
Conference Location
Venue
AfricaCrypt 2022 will take place at Faculty of Sciences Dhar El Mahraz, PO Box 1796-Atlas, Fes, Morocco.
Accommodation
The local organizers of Africacrypt 2022 have the possibility of reserving a room for you at the Royal Mirage hotel in Fez for around 90 euros.
If you wish to reserve a room in this hotel, please send an email to Abderrahmane Nitaj specifying:
- Your full name
- Your affiliation
- Check in
- Check out
The payment will be made upon arrival. Please inform Abderrahmane Nitaj before May 31, 2022.
Royal Mirage Fez
Address : Avenue des FAR, Fez
Tel : (+212) 535930909
contact : reservation.fes@royalmirageinternational.com
Website in French
Website in English
If you want a room in a cheaper hotel, for around 50 euros, we recommend the hotel Zahrat Al Jabal. For this hotel, please book your room online.
Website in English
Travel from airport of Fes to Fes city:
Bus number #16 ( Cost: 1€ )
Taxi ( Cost approximately: from 6€ to 20€ )
Travel from airport of Casablanca to Fes city:
Airplane ( Cost approximately: from 80€ to 200€ )
Train ( Cost approximately: from 10€ to 25€ )
Bus ( Cost approximately: from 10€ to 25€ )
Travel from airport of Rabat-Salé to Fes city:
Train ( Cost approximately: from 10€ to 25€ )
Bus ( Cost approximately: from 10€ to 15€ )
Visa
Many countries are exempt from visa to travel to Morocco. Please visit the official website of the Ministry of Foreign Affairs of Morocco for more informations.
List of countriesOur Sponsors & Partners
We wouldn't be able to host our conference without help from these amazing companies. A huge thanks to all our sponsors and partners!