Online Presentation
Day 1 | Day 2 | Day 3 |
---|---|---|
| Invited Talk
Title | Presenter |
High-Confidence Computing and High-Confidence Internet of Things |
|
Lattice Cryptography and PQC Standardization |
| Session 1
Title | Presenter | Abstract File |
Revocable Hierarchical Identity-Based Authenticated Key Exchange |
||
Towards Witness Encryption Without Multilinear Maps |
| Session 2
Title | Presenter | Abstract File |
Designated-Verifier Linkable Ring Signatures |
||
ATSSIA: Asynchronous Truly-Threshold Schnorr Signing for Inconsistent Availability |
| Session 3
| Session 4
Title | Presenter | Abstract File |
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods |
||
Resilient CFI: Compiler-based Attack Origin Tracking with Dynamic Taint Analysis |
| Session 5
Title | Presenter | Abstract File |
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems |
||
A Preimage Attack on Reduced Gimli-Hash |
| Session 6
Title | Presenter | Abstract File |
Algebraic Attacks on Grain-like Keystream Generators |
||
Improved See-In-The-Middle Attacks on AES |
| Session 7
Title | Presenter | Abstract File |
Differential Fault Attack on Rocca |
||
Differential Fault Attack on Lightweight Block Cipher PIPO |
||
Deep Learning-based Side-Channel Analysis on PIPO |
| Session 8
| Session 9
Title | Presenter | Abstract File |
T–depth reduction method for efficient SHA–256 quantum circuit construction |
||
Efficient Quantum Circuit of Proth Number Modular Multiplication |
| Session 10
Title | Presenter | Abstract File |
Grover on SM3 |
||
SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3 |