Online Presentation 
                        | Day 1 | Day 2 | Day 3 | 
|---|---|---|
| Invited Talk
| Title | Presenter | 
| High-Confidence Computing and High-Confidence Internet of Things | |
| Lattice Cryptography and PQC Standardization | 
| Session 1
| Title | Presenter | Abstract File | 
| Revocable Hierarchical Identity-Based Authenticated Key Exchange | ||
| Towards Witness Encryption Without Multilinear Maps | 
| Session 2
| Title | Presenter | Abstract File | 
| Designated-Verifier Linkable Ring Signatures | ||
| ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability | 
| Session 3
| Session 4
| Title | Presenter | Abstract File | 
| Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods | ||
| Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis | 
| Session 5
| Title | Presenter | Abstract File | 
| Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems | ||
| A Preimage Attack on Reduced Gimli-Hash | 
| Session 6
| Title | Presenter | Abstract File | 
| Algebraic Attacks on Grain-like Keystream Generators | ||
| Improved See-In-The-Middle Attacks on AES | 
| Session 7
| Title | Presenter | Abstract File | 
| Differential Fault Attack on Rocca | ||
| Differential Fault Attack on Lightweight Block Cipher PIPO | ||
| Deep Learning-based Side-Channel Analysis on PIPO | 
| Session 8
| Session 9
| Title | Presenter | Abstract File | 
| T–depth reduction method for efficient SHA–256 quantum circuit construction | ||
| Efficient Quantum Circuit of Proth Number Modular Multiplication | 
| Session 10
| Title | Presenter | Abstract File | 
| Grover on SM3 | ||
| SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3 | 
 
                    