Online Presentation
Day 1 | Day 2 | Day 3 |
---|---|---|
| Invited Talk
Title | Presenter |
Privacy and Transparency withBlockchain in the Era of Big Data, Machine Learning, IoT, and 5G |
|
Implementing Kyber and Dilithium |
| Session 1
Title | Presenter | Abstract File |
See-In-The-Middle Attacks on BlockciphersARIA and DEFAULT |
||
Implicit Key-stretching Security ofEncryption Schemes |
| Session 2
Title | Presenter | Abstract File |
Related-Key Differential Cryptanalysis ofGMiMC Used in Post-Quantum Signatures |
||
Impossible Differential Cryptanalysis onReduced-Round PRINCEcore |
| Session 3
| Session 4
| Session 5
| Session 6
| Session 7
| Session 8
Title | Presenter | Abstract File |
Attribute-Based Signatures for Range ofInner Product and Its Applications |
||
Identity-based Interactive AggregateSignatures from Lattices |
| Session 9
Title | Presenter | Abstract File |
Analysis of (U,U+V)-code Problem with Gramianover Binary and Ternary Fields |
||
A Message Recovery Attack on LWE/LWR-BasedPKE/KEMs Using Amplitude-Modulated EM Emanations |
| Session 10
Title | Presenter | Abstract File |
Preimage Sampling in the Higher-bitApproximate Setting With a Non-spherical Gaussian Sampler |
||
WOTSwana: A Generalized Sleeve Constructionfor Multiple Proofs of Ownership |