The 14th International Conference on Security for Information Technology and Communications –SECITC 2021 took place on November 25-26, 2021. Due to the CoVID situation and restrictions, SECITC 2021 took place online via Zoom.us video conference platform.
Conference Chairs
Peter Y A RYAN | University of Luxembourg | LUXEMBOURG | |
Cristian TOMA | Bucharest University of Economic Studies | ROMANIA |
Keynote Speakers
Marc JOYE, Zama & École Normale Supérieure, FRANCE
Functional Circuits: A new paradigm for fully homomorphic encryption
Mark D. RYAN, University of Birmingham, UK
Making Privacy Violations Transparent and Accountable
Joshua GUTTMAN, MITRE Corporation &
Worcester Polytechnic
Institute (WPI), USA
Trust Engineering via Protocol Design: Understanding Attestations from Trusted Execution Environments
Program Committee – Surname alphabetical order
Elena ANDREEVA | Technische Universität Wien | AUSTRIA | |
Ludovic APVRILLE | Institut Mines-Telecom / Telecom ParisTech | FRANCE | |
Gildas AVOINE | INSA Rennes | FRANCE | |
Claudio ARDAGNA | Universita degli Studi di Milano | ITALY | |
Josep BALASCH | Katholieke Universiteit Leuven | BELGIUM | |
Manuel BARBOSA | HASLab – INESC TEC and FCUP | PORTUGAL | |
Lasse BERNTZEN | The University College of Southeast Norway (USN) | NORWAY | |
Ion BICA | Military Technical Academy | ROMANIA | |
Catalin BOJA | Bucharest University of Economic Studies | ROMANIA | |
Guillaume BOUFFARD | ANSSI | FRANCE | |
Pooya FARSHIM | ENS | FRANCE | |
Eric FREYSSINET | ENS | FRANCE | |
Dieter GOLLMANN | Hamburg University of Technology | GERMANY | |
Johann GROSZSCHAEDL | University of Luxembourg | LUXEMBOURG | |
Rémi GERAUD-STEWART | ENS | FRANCE | |
Shoichi HIROSE | University of Fukui | JAPAN | |
Mehmet Sabir KIRAZ | De Montfort University | UK | |
Jean-Francois LALANDE | CentraleSupelec Rennes | FRANCE | |
Diana MAIMUT | Advanced Technologies Institute | ROMANIA | |
Sjouke MAUW | University of Luxembourg | LUXEMBOURG | |
Stig MJOLSNES | Norwegian University of Science and Technology (NTNU) | NORWAY | |
David NACCACHE | ENS | FRANCE | |
Vincent NICOMETTE | LAAS/CNRS | FRANCE | |
Svetla NIKOVA | KU Leuven, Dept. ESAT/COSIC and iMinds | BELGIUM | |
Ruxandra OLIMID | NTNU – Norwegian University of Science and Technology | NORWAY | |
Victor Valeriu PATRICIU | Military Technical Academy | ROMANIA | |
Marius POPA | Bucharest University of Economic Studies | ROMANIA | |
Joachim POSEGGA | University of Passau | GERMANY | |
Peter ROENNE | University of Luxembourg | LUXEMBOURG | |
Emil SIMION | University ‘Politehnica’ Bucharest | ROMANIA | |
Daniel SMITH-TONE | NIST | USA | |
Riccardo SPOLAOR | University of Oxford | UK | |
Pantelimon STĂNICĂ | Naval Postgraduate School | USA | |
Rainer STEINWANDT | Florida Atlantic University | USA | |
Ferucio Laurentiu TIPLEA | Alexandru Ioan Cuza University of Iasi | ROMANIA | |
Mihai TOGAN | Military Technical Academy | ROMANIA | |
Qianhong WU | Beihang University | CHINA | |
Sule YILDIRIM-YAYILGAN | Norwegian University of Science and Technology (NTNU) | NORWAY | |
Alin ZAMFIROIU | Bucharest University of Economic Studies | ROMANIA | |
Lei ZHANG | East China Normal University | CHINA |
Program:
The conference program is available now for download.
Conference papers
Conference papers are published in Springer, Lecture Notes in Computer Science (LNCS, volume 12596), Innovative Security Solutions for Information Technology and Communications, 13th International Conference, SecITC 2020, Bucharest, Romania, November 19–20, 2020, Revised Selected Papers
The 17 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 41 submissions.
- Elementary Attestation of Cryptographically Useful Composite Moduli, Rémi Géraud-Stewart, David Naccache
- Off-the-Shelf Security Testing Platform for Contactless Systems, Yuanzhen Liu, Gerhard Petrus Hancke, Umair Mujtaba Qureshi
- A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap 2k-Residuosity Assumption, Diana Maimuţ, George Teşeleanu
- New Insights on Differential and Linear Bounds Using Mixed Integer Linear Programming, Anubhab Baksi
- Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players, Yoshifumi Manabe, Hibiki Ono
- Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers, Hiroaki Anada
- A Scalable Simulation of the BB84 Protocol Involving Eavesdropping, Mihai-Zicu Mina, Emil Simion
- Approach to Cryptography from Differential Geometry with Example, Tetsuya Nagano, Hiroaki Anada
- On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management, Andreea-Elena Panait, Ruxandra F. Olimid
- Manager Asks: Which Vulnerability Must be Eliminated First?, David Pecl, Yehor Safonov, Zdenek Martinasek, Matej Kacic, Lubomir Almer, Lukas Malina
- An IND-CCA2 Attack Against the 1st- and 2nd-Round Versions of NTS-KEM, Tung Chou
- Behaviour-Based Biometrics for Continuous User Authentication to Industrial Collaborative Robots, Shurook S. Almohamade, John A. Clark, James Law
- Secure Speaker Recognition System Using Homomorphic Encryption, Mihai-Cristian Chindriş, Mihai Togan, Ştefan-Ciprian Arseni
- Reliable RFID Offline Privacy, Cristian Hristea
- Virtualization and Automation for Cybersecurity Training and Experimentation, Ion Bica, Roxana Larisa Unc, Ștefan Țurcanu
- Long-Term Secure Deniable Group Key Establishment, Kashi Neupane
- Card-Based Covert Lottery, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone
- Hardware-Accelerated Cryptography for Software-Defined Networks with P4, Lukas Malina, David Smekal, Sara Ricci, Jan Hajny, Peter Cíbik, Jakub Hrabovsky
- Security Analysis Using Subjective Attack Trees, Nasser Al-Hadhrami, Matthew Collinson, Nir Oren