Online Presentation

Day 1 Day 2 Day 3
     


| Invited Talk

Title Presenter
High-Confidence Computing and High-Confidence Internet of Things
Prof. Xiuzhen Cheng (Shandong University)
Lattice Cryptography and PQC Standardization
Dr. Vadim Lyubashevsky (IBM RESEARCH EUROPE IN ZURICH)


| Session 1

Title Presenter Abstract File
Revocable Hierarchical Identity-Based Authenticated Key Exchange
Yuki Okano (NTT Social Informatics Laboratories), Junichi Tomida (NTT Social Informatics Laboratories), Akira Nagai (NTT Social Informatics Laboratories), Kazuki Yoneyama (Ibaraki University), Atsushi Fujioka (Kanagawa University) and Koutarou Suzuki (Toyohashi University of Technology)
Towards Witness Encryption Without Multilinear Maps
Gwangbae Choi (Fasoo) and Serge Vaudenay (Ecole Polytechnique Fédérale de Lausanne (EPFL))


| Session 2

Title Presenter Abstract File
Designated-Verifier Linkable Ring Signatures
Pourandokht Behrouz, Panagiotis Grontas, Vangelis Konstantakatos, Aris Pagourtzis and Marianna Spyrakou (National Technical University of Athens)
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability
Snehil Joshi, Durgesh Pandey and Kannan Srinathan (International Institute of Information Technology)


| Session 3

Title Presenter Abstract File
Delegating Supersingular Isogenies over Fp2 with Cryptographic Applications
Robi Pedersen (imec-COSIC KU Leuven) and Osmanbey Uzunkol (Flensburg University of Applied Sciences)
Improved Lattice-Based Mix-Nets for Electronic Voting
Jan Willemson (STACC OU), Valeh Farzaliyev (Cybernetica AS) and Jaan Kristjan Kaasik (Tartu University)
Practical Post-quantum Password-Authenticated Key Exchange Based-on Module-Lattice
Peixin Ren and Xiaozhuo Gu (University of Chinese Academy of Sciences)


| Session 4

Title Presenter Abstract File
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
Kazuki Yamamura (NTT Social Informatics Laboratories), Yuntao Wang (Japan Advanced Institute of Science and Technology) and Eiichiro Fujisaki (Japan Advanced Institute of Science and Technology)
Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis
Oliver Braunsdorf, Stefan Sessinghaus and Julian Horsch (Fraunhofer AISEC)


| Session 5

Title Presenter Abstract File
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems
Congming Wei (Tsinghua University), Chenhao Wu (The Chinese University of Hong Kong), Ximing Fu (University of Science and Technology of China), Xiaoyang Dong (Tsinghua University), Kai He (Baidu Inc), Jue Hong (Baidu Inc) and Xiaoyun Wang (Tsinghua University)
A Preimage Attack on Reduced Gimli-Hash
Yongseong Lee (Korea University), Jinkeon Kang (National Istitute of Standards and Technology (NIST)), Donghoon Chang (Indraprastha Institute of Information Technology Delhi(IIIT-Delhi)) and Seokhie Hong (Korea University)


| Session 6

Title Presenter Abstract File
Algebraic Attacks on Grain-like Keystream Generators
Matthew Beighton, Harry Bartlett, Leonie Simpson and Kenneth Koon-Ho Wong (Queensland Univeristy of Technology)
Improved See-In-The-Middle Attacks on AES
Jonghyun Park, Hangi Kim and Jongsung Kim (Kookmin University)


| Session 7

Title Presenter Abstract File
Differential Fault Attack on Rocca
Ravi Anand (University of Hyogo) and Takanori Isobe (University of Hyogo, National Institute of Information and Communications Technology (NICT), PRESTO Japan Science and Technology Agency)
Differential Fault Attack on Lightweight Block Cipher PIPO
Seonghyuck Lim, Jaeseung Han, Tae-Ho Lee and Dong-Guk Han (Kookmin University)
Deep Learning-based Side-Channel Analysis on PIPO
Ji-Eun Woo, Jaeseung Han, Yeon-Jae Kim, Hye-Won Mun, Seonghyuck Lim, Tae-Ho Lee, Seong-Hyun An, Soo-Jin Kim and Dong-Guk Han (Kookmin University)


| Session 8

Title Presenter Abstract File
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgard Hash Function
Shoichi Hirose (University of Fukui)
Forward Secure Message Franking
Hiroki Yamamuro (Tokyo Institute of Technology), Keisuke Hara (National Institute of Advanced Industrial Science and Technology (AIST)), Masayuki Tezuka (Tokyo Institute of Technology), Yusuke Yoshida (Tokyo Institute of Technology) and Keisuke Tanaka (Tokyo Institute of Technology)
New General Framework for Algebraic Degree Evaluation of NFSR-Based Cryptosystems
Lin Ding and Zheng Wu (PLA SSF Information Engineering University)


| Session 9

Title Presenter Abstract File
T–depth reduction method for efficient SHA–256 quantum circuit construction
Jongheon Lee (University of Science & Technology), Sokjoon Lee (ETRI), You-Seok Lee (ETRI) and Dooho Choi (Korea University Sejong)
Efficient Quantum Circuit of Proth Number Modular Multiplication
Chanho Jeon, Donghoe Heo, Myeonghoon Lee, Sunyeop Kim and Seokhie Hong (Korea University)


| Session 10

Title Presenter Abstract File
Grover on SM3
Gyeongju Song (Hansung University), Kyungbae Jang(Hansung University), Hyunji Kim (Hansung University), Wai-Kong Lee (Gachon University), Zhi Hu (Central South University) and Hwajeong Seo (Hansung University)
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3
Hyunjun Kim (Hansung University), Kyungbae Jang (Hansung University), Gyeongju Song (Hansung University), Minjoo Sim (Hansung University), Siwoo Eum (Hansung University), Hunji Kim (Hansung University), Hyeokdong Kwon (Hansung University), Wai-Kong Lee (Gachon University) and Hwajeong Seo (Hansung University)