Main Program
|
KST 13:30 –
14:20 |
Session 1: Cryptanalysis of Block
Ciphers |
|
Exploring the Optimal Differential
Characteristics of SM4: Improving Automatic Search by Including
Human
Insights |
|
|
Investigation of the Optimal Linear
Characteristics of
BAKSHEESH |
|
|
KST 14:20 –
14:40 |
Break Time |
|
KST 14:40 –
15:40 |
[Invited Talk
Ⅰ] |
|
KST 15:40 –
16:00 |
Break Time |
|
KST 16:00 –
17:15 |
Session 2: Cyber Security
I |
|
Simultaneous Multiplication Protocol based on
Packed Linear Secret Sharing and its
Applications |
|
|
Reinterpreting System Calls for Enhanced IoT
Malware Analysis Using Function Call
Graphs |
|
|
LUA-IoT: Let's Usably Authenticate the
IoT |
|
|
Thursday (2024-11-21) |
|
|
KST 10:00 –
10:50 |
Session 3 : Signature
Schemes |
|
Designated-Verifier Ring Signatures: Strong
Definitions, Generic Constructions and Efficient
Instantiations |
|
|
Tightly Secure Lattice-based Synchronized
Aggregate Signature in Standard
Model |
|
|
KST 10:50
–
11:10 |
Break Time |
|
KST 11:10 –
12:00 |
Session 4 : AI
Security |
|
Pre-trained Language Models for Alert
Aggregation: Limitations and
Opportunitie"color:black"> Non-Malleable Encryption from QC-MDPC Codes Anubhab Baksi |
|
|
KST 17:45 – 18:00 |
Break Time |
|
KST 18:00 – 20:30 |
Banquet |
|
Friday (2025-11-21) |
|
|
KST 10:00 – 10:50 |
[Invited Talk IV] Relaxed Vector Commitment for Shorter Signatures Seongkwang Kim |
|
KST 10:50 – 11:05 |
Break Time |
|
KST 11:05 – 12:20 |
Session 9 : Advanced Cryptographic Protocols & Signatures (Session Chair :) |
|
Strong Designated Verifier Signatures with Non-delegatability from CSIDH Hiroki Minamide, Keisuke Tanaka, and Masayuki Tezuka |
|
|
An Undeniable Signature Scheme Utilizing Module Lattices Kunal Dey, Mansi Goyal, Aditi Kar Gangopadhyay, and Bhupendra Singh |
|
|
A Witness Encryption for Quadratic Arithmetic Programs Tao-Hsiang Chang, Yu-Chen Wu, Zi-Yuan Liu, Jen Chieh Hsu, Raylin Tso, and Masahiro Mambo |
|
|
Farewell |
|