Main Program
|
KST 13:15 – 14:05 |
Session 1: Cryptanalysis of Block Ciphers |
|
Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights |
|
|
Investigation of the Optimal Linear Characteristics of BAKSHEESH |
|
|
KST 14:05 – 14:25 |
Break Time |
|
KST 14:25 – 15:25 |
[Invited Talk Ⅰ] |
|
KST 15:45 – 17:00 |
Session 2: Cyber Security I |
|
Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications |
|
|
Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs |
|
|
LUA-IoT: Let's Usably Authenticate the IoT |
|
|
Thursday (2024-11-21) |
|
|
KST 10:00 – 10:50 |
Session 3 : Signature Schemes |
|
Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations |
|
|
Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model |
|
|
KST 10:50 – 11:10 |
Break Time |
|
KST 11:10 – 12:00 |
Session 4 : AI Security |
|
Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities |
|
|
Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS |
|
|
KST 12:00 – 13:30 |
Break Time (Lunch Time in Korea) |
|
KST 13:30 – 14:30 |
[Invited Talk II] |
|
KST 14:30 – 14:50 |
Break Time |
|
KST 14:50 – 16:05 |
Session 5 : Applied Cryptography I |
|
FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism |
|
|
A Formal Treatment of Envelope Encryption |
|
|
Efficient Privacy-Preserving Counting Method with Homomorphic Encryption |
|
|
KST 14:50 – 16:05 |
Session 6 : Applied Cryptography II |
|
Experimental Analysis of the Optimization-based Factorization Algorithm |
|
|
Fast Private Set Intersection from Polynomial Multiplication Triples |
|
|
Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation |
|
|
KST 16:05 – 16:25 UTC 07:05 – 07:25 |
Break Time |
|
KST 16:25 – 17:40 |
Session 7 : Quantum Cryptography & Deep Learning based Analysis |
|
RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques |
|
|
Quantum Circuit for Curve25519 with Fewer Qubits |
|
|
CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography |
|
|
KST 17:40 – 18:00 |
Break Time |
|
KST 18:00 – 20:30 |
Banquet |
|
Friday (2024-11-22) |
|
|
KST 10:00 – 10:50 |
Session 8 : Side-Channel & Automotive Attack |
|
REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis |
|
|
Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods |
|
|
KST 10:50 – 11:10 |
Break Time |
|
KST 11:10 – 12:25 |
Session 9 : Cyber Security II |
|
An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors |
|
|
Malicious node identification based on behavioral statistical features and social relationships |
|
|
LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System |
|
|
|
Farewell |