General information
We are pleased to announce that 22nd Central European Conference on Cryptography (CECC 2022) will be held in Smolenice, Slovakia, on June 26 - 29, 2022. The conference has become a traditional meeting point for people involved in cryptology. The aim of the conference is to gather people interested in discussing recent advances in all areas of cryptology, and experience in teaching the subject. All participants are encouraged to present a contributed talk.
The conference will take place in the Congress Center of Smolenice Castle. For further information please refer to the contact and travel information or contact the organizers.
CECC 2022 is organized by:
- Institute of Mathematics, Slovak Academy of Sciences, Bratislava, Slovakia
- Institute of Computer Science and Mathematics, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, Slovakia
Aims and scope of the conference
The aim of CECC 2022 is to bring together researchers in all aspects of cryptology, including (but not limited to):
- cryptanalysis,
- cryptographic applications in information security,
- design of cryptographic systems,
- encryption schemes,
- general cryptographic protocols,
- post-quantum cryptography,
- pseudorandomness,
- signature schemes,
- steganography.
AKMIS Workshop
AKMIS workshop will be co-located with CECC 2022. This is the 2nd Workshop on Application of Knowledge Methods in Information Security (AKMIS) which aims to become an annual event of the research community working on the knowledge methods in ontologies and knowledge-sharing that focus, but not exclusively, on information security.
Conference history
- 21st Central European Conference on Cryptography, 2021, Debrecen, Hungary
- 20th Central European Conference on Cryptography, 2020, Zagreb, Croatia
- 19th Central European Conference on Cryptography, 2019, Telč, Czechia
- 18th Central European Conference on Cryptography, 2018, Smolenice, Slovakia
- 17th Central European Conference on Cryptography, 2017, Warsaw, Poland
- 16th Central European Conference on Cryptography, 2016, Piestany, Slovakia
- 15th Central European Conference on Cryptography, 2015, Klagenfurt, Austria
- 14th Central European Conference on Cryptography, 2014, Budapest, Hungary
- 13th Central European Conference on Cryptography, 2013, Telč, Czechia
- 12th Central European Conference on Cryptography, 2012, Smolenice, Slovakia
- 11th Central European Conference on Cryptography, 2011, Debrecen, Hungary
- 10th Central European Conference on Cryptography, 2010, Bedlewo, Poland
- 9th Central European Conference on Cryptography, 2009, Třebíč, Czechia
- 8th Central European Conference on Cryptography, 2008, Graz, Austria
- TATRACRYPT '07, 2007, Smolenice, Slovakia
- NYÍRCRYPT '06, 2006, Nyíregyháza, Hungary
- MoraviaCrypt '05, 2005, Brno, Czechia
- WARTACRYPT '04, 2004, Bedlewo, Poland
- TATRACRYPT '03, 2003, Bratislava, Slovakia
- HajduCrypt '02, 2002, Debrecen, Hungary
- TATRACRYPT '01, 2001, Liptovský Ján, Slovakia
Call for papers
Central European Conference on Cryptography is an annual conference, focusing on all aspects of cryptology. The conference will take place in Smolenice Castle, Slovakia from Sunday, June 26 to Wednesday, June 29, 2022.
The aim of the conference is to bring together researchers in all aspects of cryptology, including but not limited to:
- cryptanalysis,
- cryptographic applications in information security,
- design of cryptographic systems,
- encryption schemes,
- general cryptographic protocols,
- post-quantum cryptography,
- pseudorandomness,
- signature schemes,
- cryptocurrencies, blockchain
- steganography.
Submissions must come in the form of a 2-4 page long extended abstract.
Submissions must describe novel original work of the authors.
Page limit for extended abstracts is strictly enforced, but the bibliography is excluded from
the limit.
Extended abstract should be submitted no later than April 08, 2022 April 24, 2022 (extended) to EasyChair
conference system.
The submissions will be reviewed by the program committee and authors will be informed about acceptance
or rejection by April 29, 2022 May 15, 2022.
Authors of accepted extended abstracts should present their work at the conference (or
virtually, in case of a hybrid format).
Accepted extended abstracts of registered participants will be published in conference abstract
proceedings available to conference participants.
After the conference, authors of the accepted talks are invited to submit a full length paper for a special issue of the journal Tatra Mountains Mathematical Publications (TMMP) devoted to Cryptography. Submission deadline for full papers is September 30, 2022. Full papers will be reviewed separately, with the standard review process of the TMMP journal.
Extended abstract submission
Link to EasyChair submission system: EasyChair CECC 2022
Important dates
April 08, 2022April 24, 2022 (extended): Submission of abstractsApril 29, 2022May 15, 2022: Author notification- June 26-29, 2022: The Conference
- September 30, 2022: Post-conference Proceedings
Registration
The conference fee is 250 EUR per participant. This includes food, and reception, and conference materials. Accompanying persons, and online only participants, have reduced conference fee of 125 EUR. Registration fee should be paid by wire transfer (along with the cost of accommodation) when registering for the conference, before May 31, 2022.
Payment details
Beneficiary‘s bank:
STATNA POKLADNICA
Radlinskeho 32
810 05 Bratislava
Slovakia
Beneficiary's account number: | SK97 8180 0000 0070 0066 9240 |
Beneficiary's account name: | Matematicky ustav SAV, v. v. i. |
Beneficiary's address: | Stefanikova 49, 814 73 Bratislava, Slovakia |
BIC/SWIFT: | SPSRSKBAXXX |
Country code: | SK |
Remittance information: | Variable symbol 2022 |
Message | Name of participant, CECC 2022 |
Accommodation
All conference participants and their accompanying persons are welcome to stay directly in Smolenice castle. Accommodation is available in the basic two following options:
- Single room (one person): 60 EUR/night
- Double room (two persons): 80 EUR/night
Please indicate your choice during the registration. Room price should be paid in advance along with the registration fee. For special inquiries, please contact the organizers.
Location and travel info
Train and bus connections:
Kongresové centrum Smolenice
Zámocká 18
919 04 Smolenice
GPS: 48.513533°, 17.432461°
Official Program
Sunday, June 26
Monday, June 27
Practical Side-Channel Attacks on Public-Key Cryptosystems
A Note on Non-Interactive Key Exchange from Code Equivalence
Distinguishing Biases in Elliptic Curve Standards
On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves
Solving elliptic curve discrete logarithm problem on Montgomery curve using quantum annealing and index calculus method
The security of Mimblewimble
Security Analysis of Slot Leaders Election Procedure for Pos-Based Blockchains With On-Chain Randomness Generation
Achieving security in Proof-of-proof consensus with non-zero synchronization time
Comparative analysis of the strength of AES-like and ARX encryption schemes
Cryptanalysis of Modified Kalyna Cipher Based on Division Property Distribution
Cryptanalysis of Strumok Cipher Initialization
Tuesday, June 28
Side-Channel-Assisted Key-Recovery Chosen-Ciphertext Attacks on Several NIST PQC KEMs
Breaking a linear algebraic public key cryptosystem
Secure Blind Password Registration
ICAO Travel Documents in Hands of a Dictator
New forward secure and quantum resistant digital signature scheme
Recent Advances in Fully Homomorphic Encryption
New results on algebraic constructions of Extremal Graph Theory and implementations of new algorithms of Postquantum Cryptography
Converting of Simon cipher multivariate polynomial equations to QUBO problem
An ideal pair – RNG and second-level statistical test
On a Formalized Approach to Truncated Differential Cryptanalysis of Block Ciphers
Tamper-Proofing with Self-Modifying Code
Blind accumulators for e-voting
Wednesday, June 29
Superposition Attacks on Pseudorandom Schemes based on Two or Less Permutations
On Measuring the Security Bounds of PRESENT, PRINCE and KLEIN Using MILP Approach
Conjunctive and Disjunctive Compartmented Secret Sharing Schemes using Elliptic Curves
Historical handwritten document processing using modern methods
MRHS Cryptanalysis of Ascon
Experimental Evaluation of SAT Attack on Logic Locking
CECC 23
Invited speakers
4 invited talks are planned for the conference to be given by our distinguished guests:-
Łukasz Chmielewski: Practical Side-Channel Attacks on Public-Key Cryptosystems
Masaryk University, Czechia and Radboud University Nijmegen, The NetherlandsAbstract:
This presentation covers the topic of the side-channel analysis (SCA) of public-key cryptographic implementations, in particular Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) schemes. SCA is a research area in applied cryptography that has continuously gained prominence since the late nineties. It considers adversaries leveraging the physical aspect of actual devices running cryptographic implementations. The goal of the talk is to present how in the recent 20 years new public-key implementations protected with new SCA countermeasures lead to more sophisticated SCA attacks (and vice versa). Firstly, I introduce how classical vertical attacks (for example, Simple Power Analysis and Differential Power Analysis) work against public-key implementations. Secondly, I explain the limitations of such attacks when applied to RSA (or ECC) implementations protected with various SCA countermeasures. Thirdly, I describe more modern attacks, in particular horizontal attacks, how they work and what are their limitations. Subsequently, we concentrate on the state-of-art attacks including both supervised approaches (like Template and Deep Learning Attacks) and unsupervised ones (based either on clustering or Deep Learning). All concepts are given in historical context and illustrated by practical examples. Finally, I am going to shortly talk about my current (and future) research on SCA.
-
Georg Fuchsbauer: The security of Mimblewimble, a scalable cryptocurrency
TU Wien, AustriaAbstract:
Mimblewimble is a payment protocol that underlies several cryptocurrencies and is now also supported by Litecoin. Besides offering privacy by design, it improves on scalability: while in Bitcoin every transaction must be stored forever, in Mimblewimble only the "unspent transaction outputs", which represent the current state of the system, must be kept. In joint work with Michele Orrù and Yannick Seurin, we have formally shown the security of Mimblewimble (EUROCRYPT'19), as well as that of a recent extension (ia.cr/2022/265).
-
Qian Guo: Side-channel-assisted key-recovery chosen-ciphertext attacks on several NIST PQC KEMs
Lund University, SwedenAbstract:
In this talk, we survey the recent results on side-channel-assisted key-recovery chosen-ciphertext attacks (CCAs) on several candidates for Public Key Encryption (PKE) or Key Encapsulation Mechanism (KEM) in the NIST post-quantum cryptography standardization process. Specially, we discuss the general attack model and show timing attacks against implementations of FrodoKEM, HQC, and BIKE using leakages from the Fujisaki-Okamoto transform. We also discuss power/EM attacks on ARM Cortex-M4 implementations of Kyber and Saber and on software/hardware implementations of the code-based finalist Classic McEliece. Some attack variants are difficult to thwart since a limited number of bits of information need to recover from a long leakage trace.
-
Kamil Kluczniak: Recent Advances in Fully Homomorphic Encryption
CISPA Helmholtz Center for Information Security, GermanyAbstract:
A fully homomorphic encryption (FHE) scheme allows a client to encrypt and delegate its data to a server that performs computation on the encrypted data, returning the result, which the client can then decrypt. While FHE gives confidentiality to clients' data, it does not protect the server's input and computation. Nevertheless, FHE schemes are still helpful in building protocols that reduce communication complexity, as FHE ciphertext's size should be independent of the size of the computation performed on them. We can further extend FHE by a property called circuit privacy, which guarantees that the result of computing on ciphertexts reveals no information on the computed function and the inputs of the server. Thereby, circuit private FHE gives rise to round optimal and communication efficient secure two-party computation protocols. Unfortunately, despite significant efforts and much work put into the efficiency and practical implementations of FHE schemes, very little has been done to provide useful and practical FHE supporting circuit privacy. In this work, we address this gap and design the first randomized bootstrapping algorithm whose single invocation sanitizes a ciphertext and, consequently, servers as a tool to provide circuit privacy. We can use our algorithms to finalize homomorphic computation. We give an extensive analysis, propose parameters and implement our schemes in C++. Depending on the setting, it takes only 2-3 seconds to sanitize a ciphertext for binary and non-binary plaintexts. The time is only 2x the time to run a non-sanitized bootstrapping. Crucially, we do not need to increase the parameters significantly to perform computation before or after the sanitization takes place, which is in sharp contrast to the noise flooding technique. As an example application, we show a simple private set intersection (PSI) protocol in which server online computation and communication time are independent of the server set size. We regard the PSI protocol as a side contribution of independent interest as its the first FHE-based PSI protocol with such efficient properties.
Conference Chairs
- Karol Nemoga - Slovak Academy of Sciences, Slovakia
- Pavol Zajac - Slovak University of Technology in Bratislava, Slovakia
Program committee
- László Csirmaz - UTIA, Czech Republic, and Renyi Institute, Hungary
- Andrej Dujella - University of Zagreb, Croatia
- Peter Gaži - IOHK Research, Austria
- Otokar Grošek - Slovak University of Technology in Bratislava, Slovakia
- Maciej Grześkowiak - Adam Mickiewicz University in Poznań, Poland
- Jan Hajny - Brno University of Technology, Czechia
- Tamás Herendi – University of Debrecen, Hungary
- Clemens Heuberger - Alpen-Adria-Universität Klagenfurt, Austria
- Andrea Huszti - University of Debrecen, Hungary
- Miroslaw Kutylowski - Wroclaw University of Science and Technology, Poland
- Vashek Matyáš - Masaryk University, Czechia
- Jacek Pomykała - University of Warsaw, Poland
- Håvard Raddum - Simula UiB, Norway
- Stefan Rass - Johannes Kepler University Linz, and Universitaet Klagenfurt, Austria
- Vincent Rijmen - KU Leuven, Belgium
- Martin Stanek - Comenius University, Slovakia
- Rainer Steinwandt - The University of Alabama in Huntsville, USA
- Damian Vizár - CSEM, Switzerland
- Michał Wroński - Military University of Technology, Poland
Conference chairs/Local organizers
- Karol Nemoga - Slovak Academy of Sciences, Slovakia
- Pavol Zajac - Slovak University of Technology, Slovakia
Conference support team
- Roderik Ploszek - Slovak University of Technology, Slovakia
- Pavol Marák - Slovak University of Technology, Slovakia
- Tomáš Fabšič - Slovak University of Technology, Slovakia
- Miloslav Smičík - Slovak University of Technology, Slovakia
- Peter Sýs - Slovak Academy of Sciences, Slovakia