Conference Program
Conference Program
Note: All timedates are displayed in local time Sousse, Tunisia, GMT+1.
- Tuesday, 18 July
- Wednesday, 19 July
- Thursday, 20 July
- Friday, 21 July
18:00 – 20:00
Registration
El Mouradi Palace Hotel, El Kantaoui
08:00 – 09:00
Registration
Conference venue
09:00 – 09:30
Opening Ceremony
Keynote talk 1
09:30 – 10:30
Fuzzy Extractors: Applications and Challenges
Keynote speaker: Koray Karabina
10:30 – 11:00
Coffee Break
Session 1: Implementation
11:00 – 11:25
Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions
Duc Tri Nguyen and Kris Gaj
11:25 – 11:50
Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
James Howe and Bas Westerbaan
12:00 – 14:00
Lunch break
Session 2: Blockchain
14:00 – 14:25
The curious case of the half-half Bitcoin ECDSA nonces
Dylan Rowe, Joachim Breitner and Nadia Heninger
14:25 – 14:50
Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
Mario Larangeira and Maxim Jourenko
14:50 – 15:20
Poster Presentations
15:20 – 15:50
Coffee Break
Session 3: Symmetric Cryptography
15:50 – 16:15
Poseidon2: A Faster Version of the Poseidon Hash Function
Lorenzo Grassi, Dmitry Khovratovich and Markus Schofnegger
16:15 – 16:40
Universal hashing based on field multiplication and (near-)MDS matrices
Koustabh Ghosh, Joan Daemen, Parisa Eliasi and Jonathan Fuchs
16:40 – 17:05
Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri and Marco Pedicini
17:05 – 17:30
From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Jikang Lin, Jiahui He, Yanhong Fan and Meiqin Wang
8:00 – 9:00
Registration
Conference venue
Keynote talk 2
09:00 – 10:00
The Unbearable Lightness of Symmetric Primitives
Keynote speaker: Anne Canteaut
Session 4: Protocols
10:00 – 10:25
Applications of Timed-release Encryption with Implicit Authentication
Angelique Faye Loe, Liam Medley, Christian O’Connell and Elizabeth Quaglia
10:25 – 10:50
Impossibilities in Succinct Arguments: Black-box Extraction and More
Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh and Janno Siim
10:50 – 11:20
Coffee break
11:20 – 11:35
CTF Prizes
Session 5: Quantum and Post-quantum cryptography
11:35 – 12:00
The special case of cyclotomic fields in quantum algorithms for unit groups
Razvan Barbulescu and Adrien Poulalion
12:00 – 12:25
MinRank in the Head: Short Signatures from Zero-Knowledge Proofs
Gora Adj, Luis Rivera-Zamarripa and Javier Verbel
12:25 – 13:00
Take your MEDS: Digital Signatures from Matrix Code Equivalence
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska and Monika Trimoska
13:00 – 14:30
Lunch Break
15:00 – 19:30
20:00 – …
Excursion
Gala Dinner
Add your content here…
8:00 – 9:00
Registration
Conference venue
Keynote talk 3
09:00 – 10:00
Making Sense of the Additional Signature Submissions to the NIST PQC Standardization Process
Keynote speaker: Ward Beullens
Session 6: Lattice-based Cryptography
10:00 – 10:25
Finding and Evaluating Parameters for BGV
Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu and Najwa Aaraj
10:25 – 10:50
ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain
Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey and Martin Zuber
10:50 – 11:20
Coffee Break + Poster Presentations
Session 6 bis: Lattice-based Cryptography
11:20 – 11:45
Concrete Security from Worst-Case to Average-Case Lattice Reductions
Joel Gärtner
11:45 – 12:10
Quantum Search-to-Decision Reduction for the LWE Problem
Kyohei Sudo, Masayuki Tezuka, Keisuke Hara and Yusuke Yoshida
12:10- 14:00
Lunch Break
Session 7: Cryptanalysis
14:00 – 14:25
On the Post-Quantum Security of Classical Authenticated Encryption Schemes
Nathalie Lang and Stefan Lucks
14:25 – 14:50
Efficient computation of (3^n,3^n)-isogenies
Thomas Decru and Sabrina Kunzweiler
15:00 – 15:45
Coffee Break + Poster Presentations
Session 7 bis: Cryptanalysis
15:45 – 16:10
A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial
Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso and Brice Colombier
16:10 – 16:35
Improved Cryptanalysis of the Multi-Power RSA
Abderrahmane Nitaj and Maher Boudabra
16:35 – 17:00
Concluding Remarks