An outline programme is shown below. A detailed programme of talks, keynotes and poster slots will appear here in due course.

Day 1

Tuesday 24 September

The main conference will open on Tuesday morning and will be based in the Crausaz-Wordsworth Building (CWB), set in the gardens of Robinson College, the University of Cambridge's newest College. Sessions will run throughout the day. A welcome reception and tour will take place in the early evening at the nearby Department of Computer Science and Technology. 

Day 2

Wednesday 25 September

The main conference will continue on Wednesday in the Crausaz-Wordsworth Building (CWB). Sessions will run during the morning and early afternoon. In the late afternoon there will be an outing in Cambridge. Attendees can take in the views of the Cambridge cityscape and try their hand at punting on The Backs. In the evening, attendees will dine in The Old Hall at Queens' College, built in 1448.

Day 3

Thursday 26 September

The final day of the main conference will take place on Wednesday in the Crausaz-Wordsworth Building (CWB). Sessions will run during the morning and afternoon.

Day 4

Friday 27 September

On Friday a workshop on Mobile Systems Security and Privacy will take place in the Department of Computer Science and Technology. All attendees at CANS are welcome to join the workshop without additional charge. We will have invited talks from experts in the field, supporting discussion on the latest research challenges and opportunities.

Accepted Papers

Compact Adaptor Signature from Isogenies with Enhanced Security

Pratima Jana, Surbhi Shaw and Ratna Dutta. 

Taming Delegations in Anonymous Signatures: k-Times Anonymity for Proxy and Sanitizable Signature

Xavier Bultel and Charles Olivier-Anclin. 

Mithril: Stake-based Threshold Multisignatures

Pyrros Chaidos and Aggelos Kiayias. 

1-out-of N Oblivious Transfer from MLWE

Jingting Xu and Yanbin Pan. 

 A Novel Method for Finding Differential-Linear Distinguishers: Application to Midori64, CRAFT, and Skinny64

Mei Yan, Siwei Chen, Zejun Xiang, Shasha Zhang and Xiangyong Zeng.

Compact Post-Quantum Bounded-Collusion Identity-based Encryption

Shingo Sato and Junji Shikata. 

SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection

Ege Erdogan, Unat Teksen, M. Salih Celiktenyildiz, Alptekin Küpçü and A. Ercument Cicek. 

Towards post-quantum secure PAKE - A tight security proof for OCAKE in the BPR model

Nouri Alnahawi, Kathrin Hövelmanns, Andreas Hülsing and Silvia Ritsch. 

Updatable Encryption Secure against Randomness Compromise

Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda and Kanta Matsuura. 

MarcoPolo: A Zero-Permission Attack for Location Type Inference from the Magnetic Field

Beatrice Perez, Abhinav Mehrotra and Mirco Musolesi.

LARMix++: Latency-Aware Routing in Mix Networks with Free Routes Topology

Mahdi Rahimi. 

On the Security of Privacy-Preserving Machine Learning against Model Stealing Attacks

Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee and Debdeep Mukhopadhyay. 

Semi-Automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript

Iliana Fayolle, Jan Wichelmann, Anja Köhl, Walter Rudametkin, Thomas Eisenbarth and Clémentine Maurice. 

MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing without Pre-Processing

Martin Zbudila, Erik Pohle, Aysajan Abidin and Bart Preneel. 

Scalable and Lightweight State-Channel Audits

Christian Badertscher, Dimitris Karakostas, Maxim Jourenko and Mario Larangeira. 

Cryptographic Cryptid Protocols: How to Play Cryptid with Cheaters

Xavier Bultel, Charlène Jojon and Pascal Lafourcade. 

On the Anonymity of Linkable Ring Signatures

Xavier Bultel and Charles Olivier-Anclin. 

Fault Tolerant and Malicious Secure Federated Learning

Ferhat Karakoç, Alptekin Küpçü and Melek Önen. 

PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin

Amirreza Sarencheh, Aggelos Kiayias and Markulf Kohlweiss. 

Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification

Dongyu Wu, Bei Liang, Zijie Lu and Jintai Ding. 

How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption

Sohto Chiku, Keisuke Hara, Keitaro Hashimoto, Toi Tomita and Junji Shikata. 

Collision Attacks on Hashing Modes of Areion

Kodai Taiyama, Kosei Sakamoto, Rentaro Shiba and Takanori Isobe. 

21x Speed-up of Post-Quantum Crypto Algorithm through Hardware and Software Co-design (Accelerating NTT on OTBN)

Emma Urquhart and Frank Stajano. 

Truncated Differential Cryptanalysis of the SPRING Block Cipher

Wenchang Zhou and Jiqiang Lu.

Multi-Query Verifiable PIR and Its Application

Ryuya Hayashi, Junichiro Hayata, Keisuke Hara, Kenta Nomura, Masaki Kamizono and Goichiro Hanaoka.