DE CIFRIS KOINE
Introduction to CIFRIS23 ACTA
Massimiliano Sala, Michele Ciampi, Roberto Civino, Daniele Friolo, Sihem Mesnager
Page range: 2-5
DOI: https://doi.org/10.69091/koine/vol-1-I01
Cryptography and its Applications in the Italian Scenario
Massimo Giulietti
Page range: 17-18
DOI: https://doi.org/10.69091/koine/vol-1-I02
La visione di De Cifris: partnership con le aziende leader
Antonino Alì
Page range: 19-21
DOI: https://doi.org/10.69091/koine/vol-1-I03
SCIENTIFIC SESSION (MAIN PROGRAM)
Introduction to the Scientific Session
Michele Ciampi, Sihem Mesnager
Page range: 30-30
DOI: https://doi.org/10.69091/koine/vol-1-M01
Keynote: MPC in the head for isomorphisms and group action
Antoine Joux
Page range: 32-33
DOI: https://doi.org/10.69091/koine/vol-1-M02
Efficiency of SIDH-based signatures (yes, SIDH)
Wissam Ghantous, Federico Pintore and Mattia Veroni
Page range: 34-35
DOI: https://doi.org/10.69091/koine/vol-1-M03
The group structure of elliptic curves over Z/NZ
Massimiliano Sala and Daniele Taufer
Page range: 36-38
DOI: https://doi.org/10.69091/koine/vol-1-M04
FPGA And Software Acceleration of Multi-Scalar Multiplication: CycloneMSM
Kaveh Aasaraai, Emanuele Cesena, Rahul Maganti, Nicolas Stalder, and Javier Varela
Page range: 40-40
DOI: https://doi.org/10.69091/koine/vol-1-M05
On Linear Codes with Random Multiplier Vectors and the Maximum Trace Dimension Property
Márton Erdélyi, Pál Hegedüs, Sándor Z. Kiss, and Gábor P. Nagy
Page range: 41-42
DOI: https://doi.org/10.69091/koine/vol-1-M06
On a generalization of the Deligne-Lustzig curve of Suzuki type and application to AG codes
Marco Timpanella
Page range: 43-44
DOI: https://doi.org/10.69091/koine/vol-1-M07
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes
Kyosuke Yamashita and Keisuke Hara
Page range: 45-47
DOI: https://doi.org/10.69091/koine/vol-1-M08
Keynote: Threshold Implementations: Securing Implementations of Symmetric-Key Algorithms
Svetla Nikova
Page range: 49-51
DOI: https://doi.org/10.69091/koine/vol-1-M09
Differential experiments using parallel alternative operations
Marco Calderini, Roberto Civino, and Riccardo Invernizzi
Page range: 52-54
DOI: https://doi.org/10.69091/koine/vol-1-M10
Automatic Boomerang Attacks Search on Rijndael
Marine Minier, Loïc Rouquette, and Christine Solnon
Page range: 55-56
DOI: https://doi.org/10.69091/koine/vol-1-M11
Searchable Encryption with randomized ciphertext and randomized keyword search
Marco Calderini, Riccardo Longo, Massimiliano Sala, and Irene Villa
Page range: 58-60
DOI: https://doi.org/10.69091/koine/vol-1-M12
Cryptanalysis of a privacy-preserving authentication scheme
Sigurd Eskeland
Page range: 61-63
DOI: https://doi.org/10.69091/koine/vol-1-M13
mRLWE-CP-ABE: a revocable CP-ABE for post-quantum cryptography
Marco Cianfriglia, Elia Onofri and Marco Pedicini
Page range: 64-66
DOI: https://doi.org/10.69091/koine/vol-1-M14
WORKSHOPS
Introduction to CBDCs Workshop
Daniel Broby
Page range: 70-72
DOI: https://doi.org/10.69091/koine/vol-1-W01
Crypto assets' value and investor protection
Gianfranco Trovatore
Page range: 73-74
DOI: https://doi.org/10.69091/koine/vol-1-W02
What consensus mechanism will be used for Central Bank Digital Currencies (CBDCs)?
Vincenzo Vespri and Filippo Zatti
Page range: 75-77
DOI: https://doi.org/10.69091/koine/vol-1-W03
CBDCs: A new generation of digital cash
Guneet Kaur and Andrea Bracciali
Page range: 78-81
DOI: https://doi.org/10.69091/koine/vol-1-W04
Introduction to PQ Workshop
Marco Baldi, Giulio Codogni, Elisa Gorla , Roberto La Scala, Alessio Meneghetti, Emanuela Orsini , Gerardo Pelosi, Edoardo Persichetti, and Federico Pintore
Page range: 83-84
DOI: https://doi.org/10.69091/koine/vol-1-W05
SQIsign The new herald of isogeny based crypto
Luca De Feo
Page range: 85-87
DOI: https://doi.org/10.69091/koine/vol-1-W06
No one should learn from these errors: surveying fault attack resistance of post quantum cryptosystems
Alessandro Barenghi
Page range: 88-90
DOI: https://doi.org/10.69091/koine/vol-1-W07
MCE and MEDS: From Group Actions to Signatures
Krijn Reijnders
Page range: 91-93
DOI: https://doi.org/10.69091/koine/vol-1-W08
Signatures from Five-Pass Zero-Knowledge Protocols and the Curious Case of CROSS
Paolo Santini
Page range: 94-96
DOI: https://doi.org/10.69091/koine/vol-1-W09
Introduction to TAC Workshop
Silvio Ranise and Alessandro Tomasi
Page range: 98-99
DOI: https://doi.org/10.69091/koine/vol-1-W10
Royal Rumbles in Cryptography: the NIST PQC Competition
Marco Baldi
Page range: 100-101
DOI: https://doi.org/10.69091/koine/vol-1-W11
Multiparty Class Group Encryption and Applications to E-Voting
Michele Battagliola, Giuseppe D’Alconzo, Andrea Gangemi, and Chiara Spadafora
Page range: 105-106
DOI: https://doi.org/10.69091/koine/vol-1-W13
Vote App: Verifiable and Coercion-Resistant I-Voting
Riccardo Longo, Chiara Spadafora, and Francesco Antonio Marino
Page range: 107-109
DOI: https://doi.org/10.69091/koine/vol-1-W14
OpenABE Bindings for Kotlin
Stefano Berlato, Roberto Carbone, and Silvio Ranise
Page range: 110-112
DOI: https://doi.org/10.69091/koine/vol-1-W15
Cryptographic Enforcement of Attribute-based Access Control Policies
Stefano Berlato, Alessandro Colombo, Roberto Carbone, and Silvio Ranise
Page range: 113-115
DOI: https://doi.org/10.69091/koine/vol-1-W16
Privacy Preserving Machine Learning with TFHE
Andrei Stoian
Page range: 118-118
DOI: https://doi.org/10.69091/koine/vol-1-W17
PPML: Machine learning on data you cannot see
Valerio Maggio
Page range: 119-120
DOI: https://doi.org/10.69091/koine/vol-1-W18
Introduction to Group-based Workshop
Norberto Gavioli, Carmine Monetta, and Marialaura Noce
Page range: 122-123
DOI: https://doi.org/10.69091/koine/vol-1-W19
The Impact of the Semidirect Discrete Logarithm Problem (SDLP) in Post-quantum Cryptography PQC
Delaram Kahrobaei
Page range: 124-126
DOI: https://doi.org/10.69091/koine/vol-1-W20
Some results on the groups generated by round functions
Riccardo Aragona
Page range: 127-129
DOI: https://doi.org/10.69091/koine/vol-1-W21
A method to cryptanalyze (Simultaneous) Conjugacy Search Problem in certain Metabelian Platform Groups
Martina Vigorito
Page range: 130-132
DOI: https://doi.org/10.69091/koine/vol-1-W22
Linearization of hard problems via right-angled Artin groups
Ramón Flores, Delaram Kahrobaei, and Thomas Koberda
Page range: 133-134
DOI: https://doi.org/10.69091/koine/vol-1-W23
A “smart” application of homomorphic encryption
Antonio Tortora
Page range: 135-136
DOI: https://doi.org/10.69091/koine/vol-1-W24