13th International Conference on Cryptology

AFRICACRYPT 2022

July 18-20, 2022 - Fes, Morocco

Important Dates








Latest News

Conference Proceedings are published. Find them here.
The proceedings will be available for free until November 14, 2022.

The presentations of the invited talks are here and here.

Conference Program is announced. Check it here.

Call for posters is announced. Read more here.

About AfricaCrypt Conference

AfricaCrypt is an Annual International Conference on the Theory and Applications of Cryptology. AfricaCrypt is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field, and has seen many renown researchers deliver keynote presentations. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Important Dates

  • Paper Submission deadline : February 25, 2022 March 6, 2022 (Deadline Extended)
  • Paper Acceptance notification : April 22, 2022 April 29, 2022 (Deadline Extended)
  • Camera-ready version : May 12, 2022 May 19, 2022 (Deadline Extended)
  • Poster submission deadline : June 1, 2022 June 12, 2022 (Deadline Extended)
  • Poster acceptance notification : June 8, 2022 June 20, 2022 (Deadline Extended)
  • Registration for accepted posters deadline : July 1, 2022
  • Conference: July 18-20, 2022

Registration is open

Important Information

AfricaCrypt 2022 is co-organized by Faculty of Sciences, Sidi Mohamed Ben Abdellah University, Fes, Morocco, in cooperation with the International Association for Cryptologic Research (IACR).

Registration is open.

iacrlogo

The proceedings are published by Springer's Lecture Notes in Computer Science (LNCS) and they can be accessed here

springer logo

Lilya Budaghyan - University of Bergen, Norway

Lilya Budaghyan is a professor and the head of the Selmer Center in Secure Communication, Department of Informatics, University of Bergen, Norway. She received her Ph.D. degree from the University of Magdeburg, Germany, in 2005, and the habilitation degree from the University of Paris 8, France, in 2013. Her main research interests include cryptographic Boolean functions and discrete structures and their applications. She also conducted her research at Yerevan State University (Armenia), the University of Trento (Italy) and Telecom ParisTech (France). She was a recipient of the Trond Mohn Foundation Award in 2016, the Young Research Talent Grant from the Norwegian Research Council in 2014, a Postdoctoral Fellowship Award from the Foundation of Mathematical Sciences of Paris in 2012, and the Emil Artin Junior Prize in Mathematics in 2011. Since 2018, she has been a member of the Norwegian Academy of Technological Sciences (NTVA).

Talk title: In search of equivalence relations for cryptographic Boolean functions ( slides )

Talk abstract: Boolean functions are among the most fundamental objects in pure and applied mathematics and computer science. In particular, in cryptography block ciphers are designed by appropriate composition of Boolean functions, and the security of a block cipher depends on special Boolean functions called S-boxes.
The two main cryptographic properties of S-boxes, differential uniformity and nonlinearity, measure the resistance of S-boxes to the two most powerful classical attacks, differential and linear cryptanalyses, respectively. Equivalence relations preserving differential uniformity and nonlinearity divide the set of all functions into classes. Among such equivalence relations are affine, extended affine and CCZ-equivalences. Studying these equivalence relations and finding new ones is important for the following two reasons: first, they can be powerful construction methods providing for each function a huge class of functions with the same properties, and, second, instead of checking invariant properties for all functions, it is enough to check only one in each class.
In the present talk we discuss known equivalence relations of cryptographic functions and possible ways for finding new such equivalence relations.

Matthieu Rivain - Cryptoexperts, France

Matthieu is a researcher and entrepreneur in cryptography. He has conducted his PhD study at the University of Luxembourg between 2006 and 2009 while being a cryptography engineer at Oberthur (now Idemia). In 2010, Matthieu joined CryptoExperts, a young technology and service company in cryptography, which he today leads as CEO. Matthieu’s research interests cover several aspects of applied cryptography such as secure cryptographic implementations, side-channel attacks, elliptic-curve cryptography, white-box cryptography, and more recently zero-knowledge proofs. Matthieu has been an active member of IACR since 2007, and in particular of the CHES conference, which he co-organised in 2015 (as general co-chair) and in 2018 (as program co-chair).

Talk title: A quest for provable security against side-channel attacks ( slides )

Talk abstract: We live in a world in which cryptography has become ubiquitous. Devices around us are constantly processing cryptographic computations to ensure the confidentiality and the authenticity of our communications. Over the last forty years, the scientific community and the industry have converged towards the paradigm of provable security for cryptographic algorithms and protocols: they should come with a security proof formally stating their security under well-studied computational hardness assumptions.
In the late 90’s, it was shown that the implementations of (provably secure) cryptosystems could be practically broken by side-channel attacks which exploit their physical leakage, such as their execution time, power consumption, or electromagnetic emanation. While a lot of progress was made over the last decades to design practical countermeasures against side-channel attacks, achieving provable security for cryptographic implementations under this threat is still a work in progress.
In this talk, I will present on-going research efforts to achieve this goal. We will see how to formally model the side channel leakage under the assumption that it is somehow noisy. We will further study the masking technique whose principle is to apply secret sharing at the computation level. We will see how to reason about the security of masking in different formal models and will discuss the remaining gaps to be closed in the quest for provable security against side-channel attacks.

Below you'll find the program for AfricaCrypt 2022. We'll keep this page regularly updated with all new speakers and sessions, so be sure to keep checking in!

Note: All timedates are displayed in local time Fes, Morocco, GTM+1.

18:00 - 20:00

Registration

Royal Mirage hotel


08:00 - 08:50

Registration

Conference venue


08:50 - 09:15

Opening Ceremony


Session 1: Symmetric cryptography

Chair: Olivier Blazy

09:15 - 09:40
Construction of Recursive MDS Matrices Using DLS Matrices

Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta

09:40 -10:05
FUTURE: A Lightweight Block Cipher Using An Optimal Diffusion Matrix

Kishan Chand Gupta, Sumit Kumar Pandey and Susanta Samanta

10:05 - 10:30
A Small GIFT-COFB: Lightweight Bit-Serial Architectures

Andrea Caforio, Daniel Collins, Subhadeep Banik and Francesco Regazzoni


10:30 - 11:00

Coffee break


Keynote Talk 1 by Lilya Budaghyan

Chair: Joan Daemen

11:00 - 12:00
In search of equivalence relations for cryptographic Boolean functions

Keynote Speaker: Lilya Budaghyan


12:00 - 14:00

Lunch break


Session 2: Attribute and identity based encryption

Chair: Lilya Budaghyan

14:00 - 14:25
Identity Based Encryption in DDH hard Groups

Olivier Blazy and Saqib A. Kakvi

14:25 - 14:50
TinyABE: Unrestricted Ciphertext-Policy Attribute-Based Encryption for Embedded Devices and Low-Quality Networks

Marloes Venema and Greg Alpár


14:50 - 16:00

Session 3: Poster Presentations

Chair: Stjepan Picek


16:00 - 16:30

Coffee break and Poster Session


Session 4: Symmetric cryptanalysis

Chair: Lhoussain El Fadil

16:30 - 16:55
Cryptanalysis of Reduced Round SPEEDY

Raghvendra Rohit and Santanu Sarkar

16:55 - 17:20
And Rijndael? Automatic Related-key Differential Analysis of Rijndael

David Gérault, Marine Minier, Loïc Rouquette and Christine Solnon

17:20 - 17:45
Breaking Panther

Christina Boura, Rachelle Heim Boissier and Yann Rotella


08:00 - 08:50

Registration

Conference venue


Session 5: Post-quantum cryptography

Chair: Abderrahmane Nitaj

08:50 - 09:15
Solving the Learning Parity with Noise Problem using Quantum Algorithms

Bénédikt Tran and Serge Vaudenay

09:15 - 09:40
An estimator for the hardness of the MQ problem

Javier Verbel, Emanuelle Bellini, Rusydi H. Makarim and Carlo Sanna

09:40 - 10:05
Recovering Rainbow's Secret Key with a First- Order Fault Attack

Thomas Aulbach, Tobias Kovats, Juliane Krämer and Soundes Marzougui

10:05 - 10:30
Dilithium for Memory Constrained Devices

Joppe Bos, Joost Renes and Daan Sprenkels


10:30 - 11:00

Coffee break and Poster session


Keynote Talk 2 by Matthieu Rivain

Chair: Lejla Batina

11:00 - 12:00
A quest for provable security against side-channel attacks

Keynote Speaker: Matthieu Rivain


12:00 - 14:00

Lunch break


14:30 - 18:30

Guided visit of Old Medina


19:30 - --:--

Gala dinner


08:00 - 08:30

Registration

Conference venue


Session 6: Selected topics of cryptography I (online)

Chair: Joan Daemen

09:00 - 09:20
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards

Rikuo Haga, Yuichi Hayashi, Daiki Miyahara and Takaaki Mizuki

09:20 - 09:40
Automated Key Recovery Attacks on Round- Reduced Orthros

Muzhou Li, Ling Sun and Meiqin Wang

09:40 - 10:00
EHNP Strikes Back: Analyzing SM2 Implementations

Jinzheng Cao, Qingfeng Cheng and Jian Weng


10:00 - 10:35

Coffee break and Poster session


Session 7: Side-channel attacks and foundations

Chair: Serge Vaudenay

10:35 - 11:00
TransNet: Shift Invariant Transformer Network for Power Attack

Suvadeep Hajra, Sayandeep Saha, Manaar Alam and Debdeep Mukhopadhyay

11:00 - 11:25
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA

Azade Rezaeezade, Guilherme Perin and Stjepan Pice

11:25 - 11:50
A Random Oracle for All of Us

AMarc Fischlin, Felix Rohrbach and Tobias Schmalz


12:00 - 14:00

Lunch break


Session 8: Public key (crypt)analysis

Chair: Hussain Benazza

14:00 - 14:25
DiSSECT : Distinguisher of Standard & Simulated Elliptic Curves via Traits

Vladimir Sedlacek, Vojtech Suchanek, Antonin Dufka, Marek Sys and Vashek Matyas

14:25 - 14:50
Co-factor clearing and subgroup membership testing on pairing-friendly curves

Youssef El Housni, Aurore Guillevic and Thomas Piellard

14:50 - 15:15
A Generalized Attack on the Multi-Prime Power RSA

Abderrahmane Nitaj, Willy Susilo and Joseph Tonien

15:15 - 15:40
Finding Low-Weight Polynomial Multiples Using the Rho Method

Laila El Aimani


15:40 - 16:10

Coffee break and Poster session


Session 9: Selected topics of cryptography II

Chair: Lejla Batina

16:10 - 16:35
A Secure Authentication Protocol for Cholesteric Spherical Reflectors using Homomorphic Encryption

Mónica P. Arenas, Muhammed A. Bingol, Huseyin Demirci, Georgios Fotiadis and Gabriele Lenzini

16:35 - 16:55
Lattice-Based Inner Product Argument (online)

Veronika Kuchta, Gaurav Sharma and Rajeev Anand Sahu

16:55 - 17:15
Streaming SPHINCS+ for Embedded Devices using the Example of TPMs (online)

Ruben Niederhagen, Johannes Roth and Julian Wälde


17:15 - 17:25

Concluding Remarks


Venue

AfricaCrypt 2022 will take place at Faculty of Sciences Dhar El Mahraz, PO Box 1796-Atlas, Fes, Morocco.

Accommodation

The local organizers of Africacrypt 2022 have the possibility of reserving a room for you at the Royal Mirage hotel in Fez for around 90 euros.

If you wish to reserve a room in this hotel, please send an email to Abderrahmane Nitaj specifying:

  • Your full name
  • Your affiliation
  • Check in
  • Check out

The payment will be made upon arrival. Please inform Abderrahmane Nitaj before May 31, 2022.

Royal Mirage Fez
Address : Avenue des FAR, Fez
Tel : (+212) 535930909
contact : reservation.fes@royalmirageinternational.com

Website in French
Website in English


If you want a room in a cheaper hotel, for around 50 euros, we recommend the hotel Zahrat Al Jabal. For this hotel, please book your room online.

Website in English

Get Directions

Travel from airport of Fes to Fes city:

Bus number #16 ( Cost: 1€ )
Taxi ( Cost approximately: from 6€ to 20€ )

Travel from airport of Casablanca to Fes city:

Airplane ( Cost approximately: from 80€ to 200€ )
Train ( Cost approximately: from 10€ to 25€ )
Bus ( Cost approximately: from 10€ to 25€ )

Travel from airport of Rabat-Salé to Fes city:

Train ( Cost approximately: from 10€ to 25€ )
Bus ( Cost approximately: from 10€ to 15€ )

Visa

Many countries are exempt from visa to travel to Morocco. Please visit the official website of the Ministry of Foreign Affairs of Morocco for more informations.

List of countries

We wouldn't be able to host our conference without help from these amazing companies. A huge thanks to all our sponsors and partners!

Platinum Sponsors
Gold Sponsors
Silver Sponsors
Bronze Sponsors
Organisers