Online Presentation


| Invited Talk

Title Presenter Video File Abstract File
Tweakable Block Cipher-Based Cryptography
Thomas Peyrin
Nanyang Technological University
Designing and Implementing the NIST Post-quantum Public-key Candidate Saber
Sujoy Sinha Roy
University of Birmingham
Next Generation Cryptography Standards
Lily Chen
National Institute of Standards and Technology


| Session 1: Security Models

Title Presenter Video File Abstract File
Security Definitions on Time-Lock Puzzles
Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka
Tokyo Institute of Technology, National Institute of Advanced Industrial Science and Technology
Secret Sharing with Statistical Privacy and Computational Relaxed Non-Malleability
Tasuku Narita, Fuyuki Kitagawa, Yusuke Yoshida, Keisuke Tanaka
Tokyo Institute of Technology, NTT Secure Platform Laboratories


| Session 2: Cryptography in Quantum Computer Age

Title Presenter Video File Abstract File
(Quantum) Cryptanalysis of Misty schemes
Aline Gouget, Jacques Patarin, Ambre Toulemonde
Thales DIS, Universit´e de Versailles Saint-Quentin-en-Yvelines
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi
The University of Tokyo, Mitsubishi Electric Corporation


| Session 3: Constructions and Designs

Title Presenter Video File Abstract File
A Sub-linear Lattice-based Submatrix Commitment Scheme
Huang Lin
Mercury's Wing & Suterusu project
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong
Kookmin University, Hansung University, Korea University, University of Seoul, Jeonbuk National University


| Session 4: Efficient Implementations

Title Presenter Video File Abstract File
Curve448 on 32-bit ARM Cortex-M4
Hwajeong Seo, Reza Azarderakhsh
Hansung University, Florida Atlantic University
Efficient Implementation of SHA-3 Hash Function on 8-bit AVR-based Sensor Nodes


| Session 5: Security Analysis

Title Presenter Video File Abstract File
Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?
Nicolas T. Courtois, Jean-Jacques Quisquater
University College London, Universite Catholique de Louvain
Key Mismatch Attack on ThreeBears, Frodo and Round5
A New Non-random Property of 4.5-Round PRINCE
Bolin Wang, Chan Song, Wenling Wu, Lei Zhang
Chinese Academy of Sciences, University of Chinese Academy of Sciences


| Session 6: Artificial Intelligence and Cryptocurrency

Title Presenter Video File Abstract File
Generative Adversarial Networks-based Pseudo-Random Number Generator for Embedded Processors
A RDBMS-based Bitcoin Analysis Method
Hyunsu Mun, Soohyun Kim, Youngseok Lee
Chungnam National University


| Session 7: Fault and Side-Channel Attack

Title Presenter Video File Abstract File
Federated Learning in Side-Channel Analysis
Huanyu Wang, Elena Dubrova
KTH Royal Institute of Technology
Differential Fault based Key Recovery Attacks on TRIAD