Online Presentation
| Invited Talk
| Title | Presenter | Video File | Abstract File |
|
Tweakable Block Cipher-Based Cryptography
|
|
||
|
Designing and Implementing the NIST Post-quantum Public-key Candidate Saber
|
|
||
|
Next Generation Cryptography Standards
|
|
| Session 1: Security Models
| Title | Presenter | Video File | Abstract File |
|
Security Definitions on Time-Lock Puzzles
|
|
||
|
Secret Sharing with Statistical Privacy and Computational Relaxed Non-Malleability
|
|
| Session 2: Cryptography in Quantum Computer Age
| Title | Presenter | Video File | Abstract File |
|
(Quantum) Cryptanalysis of Misty schemes
|
|
||
|
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH
|
|
| Session 3: Constructions and Designs
| Title | Presenter | Video File | Abstract File |
|
A Sub-linear Lattice-based Submatrix Commitment Scheme
|
|
||
|
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
|
|
| Session 4: Efficient Implementations
| Title | Presenter | Video File | Abstract File |
|
Curve448 on 32-bit ARM Cortex-M4
|
|
||
|
Efficient Implementation of SHA-3 Hash Function on 8-bit AVR-based Sensor Nodes
|
|
| Session 5: Security Analysis
| Session 6: Artificial Intelligence and Cryptocurrency
| Title | Presenter | Video File | Abstract File |
|
Generative Adversarial Networks-based Pseudo-Random Number Generator for Embedded Processors
|
|
||
|
A RDBMS-based Bitcoin Analysis Method
|
|