Online Presentation
| Day 1 | Day 2 | Day 3 |
|---|---|---|
| Invited Talk
| Title | Presenter |
|
High-Confidence Computing and High-Confidence Internet of Things |
|
|
Lattice Cryptography and PQC Standardization |
| Session 1
| Title | Presenter | Abstract File |
|
Revocable Hierarchical Identity-Based Authenticated Key Exchange |
||
|
Towards Witness Encryption Without Multilinear Maps |
| Session 2
| Title | Presenter | Abstract File |
|
Designated-Verifier Linkable Ring Signatures |
||
|
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability |
| Session 3
| Session 4
| Title | Presenter | Abstract File |
|
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods |
||
|
Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis |
| Session 5
| Title | Presenter | Abstract File |
|
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems |
||
|
A Preimage Attack on Reduced Gimli-Hash |
| Session 6
| Title | Presenter | Abstract File |
|
Algebraic Attacks on Grain-like Keystream Generators |
||
|
Improved See-In-The-Middle Attacks on AES |
| Session 7
| Title | Presenter | Abstract File |
|
Differential Fault Attack on Rocca |
||
|
Differential Fault Attack on Lightweight Block Cipher PIPO |
||
|
Deep Learning-based Side-Channel Analysis on PIPO |
| Session 8
| Session 9
| Title | Presenter | Abstract File |
|
T–depth reduction method for efficient SHA–256 quantum circuit construction |
||
|
Efficient Quantum Circuit of Proth Number Modular Multiplication |
| Session 10
| Title | Presenter | Abstract File |
|
Grover on SM3 |
||
|
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3 |