Online Presentation
| Day 1 | Day 2 | Day 3 |
|---|---|---|
| Invited Talk
| Title | Presenter |
|
Privacy and Transparency withBlockchain in the Era of Big Data, Machine Learning, IoT, and 5G |
|
|
Implementing Kyber and Dilithium |
| Session 1
| Title | Presenter | Abstract File |
|
See-In-The-Middle Attacks on BlockciphersARIA and DEFAULT |
||
|
Implicit Key-stretching Security ofEncryption Schemes |
| Session 2
| Title | Presenter | Abstract File |
|
Related-Key Differential Cryptanalysis ofGMiMC Used in Post-Quantum Signatures |
||
|
Impossible Differential Cryptanalysis onReduced-Round PRINCEcore |
| Session 3
| Session 4
| Session 5
| Session 6
| Session 7
| Session 8
| Title | Presenter | Abstract File |
|
Attribute-Based Signatures for Range ofInner Product and Its Applications |
||
|
Identity-based Interactive AggregateSignatures from Lattices |
| Session 9
| Title | Presenter | Abstract File |
|
Analysis of (U,U+V)-code Problem with Gramianover Binary and Ternary Fields |
||
|
A Message Recovery Attack on LWE/LWR-BasedPKE/KEMs Using Amplitude-Modulated EM Emanations |
| Session 10
| Title | Presenter | Abstract File |
|
Preimage Sampling in the Higher-bitApproximate Setting With a Non-spherical Gaussian Sampler |
||
|
WOTSwana: A Generalized Sleeve Constructionfor Multiple Proofs of Ownership |