Online Presentation
| Invited Talk
Title | Presenter | Video File | Abstract File |
Tweakable Block Cipher-Based Cryptography
|
|
||
Designing and Implementing the NIST Post-quantum Public-key Candidate Saber
|
|
||
Next Generation Cryptography Standards
|
|
| Session 1: Security Models
Title | Presenter | Video File | Abstract File |
Security Definitions on Time-Lock Puzzles
|
|
||
Secret Sharing with Statistical Privacy and Computational Relaxed Non-Malleability
|
|
| Session 2: Cryptography in Quantum Computer Age
Title | Presenter | Video File | Abstract File |
(Quantum) Cryptanalysis of Misty schemes
|
|
||
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
|
|
| Session 3: Constructions and Designs
Title | Presenter | Video File | Abstract File |
A Sub-linear Lattice-based Submatrix Commitment Scheme
|
|
||
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
|
|
| Session 4: Efficient Implementations
Title | Presenter | Video File | Abstract File |
Curve448 on 32-bit ARM Cortex-M4
|
|
||
Efficient Implementation of SHA-3 Hash Function on 8-bit AVR-based Sensor Nodes
|
|
| Session 5: Security Analysis
| Session 6: Artificial Intelligence and Cryptocurrency
Title | Presenter | Video File | Abstract File |
Generative Adversarial Networks-based Pseudo-Random Number Generator for Embedded Processors
|
|
||
A RDBMS-based Bitcoin Analysis Method
|
|