Papers

The symposium will take place over the course of two days. Meetings will involve lectures and discussions covering important topics in cyber security, cryptography and machine learning.

Single Tweakey Cryptanalysis of Reduced-Round \skinny-64 Orr Dunkelman, Senyang Huang, Eran Lambooij and Stav Perle.

Has been selected as best paper.

This work studies cryptanalysis of the Skinny lightweight encryption algorithm,
identifies certain flaws and proposes new and improved attacks.
First, the authors look at truncated differential distinguishers by searching for bias in the output differences: they extend previously known truncated differential paths and reach 15-round of the SKINNY-64-128 version. Then, the authors consider impossible differential attacks, describe and correct flaws in previous work, and eventually reach 18-round of the SKINNY-64-128 version. They provide experimental verification of their attacks.



List of Papers Accepted to the Academic Research Track:
Full Papers

1. Single Tweakey Cryptanalysis of Reduced Round Skinny-64
Orr Dunkelman, Senyang Huang, Eran Lambooij and Stav Perle

2. Zero-Knowledge to the Rescue: Consistent Redundant Backup of Keys Generated for Critical Financial Services
Moti Yung

3. Security Ranking of IoT Devices Using an AHP Model
Shachar Siboni, Chanan Glezer, Rami Puzis, Assaf shabtay and Yuval Elovici

4. Robust Malicious Domain Detection
Nitay Hason, Amit Dvir and Chen Hajaj

5. NeuroGIFT : Using a Machine Learning Based Sat Solver for Cryptanalysis
David Gerault, Thomas Peyrin, Ling Sun and Adrien Benamira

6. Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning
Nitesh Kumar, Ajay Singh, Anand Handa and Sandeep Kumar Shukla

7. Fast polynomial inversion for post quantum QC-MDPC cryptography
Nir Drucker, Shay Gueron and Dusan Kostic

8. Efficient CORDIC-based Sine and Cosine implementation for a Dataow Architecture
Daniel Khankin, Elad Raz and Ilan Tayari

09. SecureMCMR: Computation Outsourcing for MapReduce Applications
Lindsey Kennard and Ana Milanova

10. Toward Self-Stabilizing Blockchain, Reconstructing Totally Erased Blockchain
Shlomi Dolev and Matan Liber

11. A Recommender System for e_cient implementation of Privacy Preserving Machine Learning Primitives based on FHE
Imtiyazuddin Shaik, Ajeet Kumar Singh, Harika Narumanchi, Nitesh Emmadi and Rajan Ma

12. Comparison of DNS based Methods for Detecting Malicious Domains
Eyal Paz and Ehud Gudes

-->
Short papers

1. Can the operator of a drone be located by following the drone's path?
Gera Weiss, Eliyahu Mashhadi and Yossi Oren

2. Evasion is not enough: A case study of Android malware
Harel Berger, Chen Hajaj and Amit Dvir

3. Average-case competitive ratio for evaluating scheduling algorithms of multi-user cache
Daniel Berend, Shlomi Dolev, Avinatan Hassidim and Marina Sadetsky

4. CryptoRNN - Privacy-Preserving Recurrent Neural Networks using Homomorphic Encryption
Maya Bakshi and Mark Last







-->