Conference Program

Conference Program

Note: All timedates are displayed in local time Sousse, Tunisia, GMT+1.

Program in PDF format.

  • Tuesday, 18 July
  • Wednesday, 19 July
  • Thursday, 20 July
  • Friday, 21 July

18:00 – 20:00

Registration

El Mouradi Palace Hotel, El Kantaoui 



08:00 – 09:00

Registration

Conference venue


09:00 – 09:30

Opening Ceremony


Keynote talk 1

09:30 – 10:30

Fuzzy Extractors: Applications and Challenges
Keynote speaker: Koray Karabina


10:30 – 11:00

Coffee Break


Session 1: Implementation

11:00 – 11:25

Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions
Duc Tri Nguyen and Kris Gaj

11:25 – 11:50

Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7
James Howe and Bas Westerbaan


12:00 – 14:00

Lunch break


Session 2: Blockchain

14:00 – 14:25

The curious case of the half-half Bitcoin ECDSA nonces
Dylan Rowe, Joachim Breitner and Nadia Heninger

14:25 – 14:50

Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality
Mario Larangeira and Maxim Jourenko


14:50 – 15:20

Poster Presentations


15:20 – 15:50

Coffee Break


Session 3: Symmetric Cryptography

15:50 – 16:15

Poseidon2: A Faster Version of the Poseidon Hash Function
Lorenzo Grassi, Dmitry Khovratovich and Markus Schofnegger

16:15 – 16:40

Universal hashing based on field multiplication and (near-)MDS matrices
Koustabh Ghosh, Joan Daemen, Parisa Eliasi and Jonathan Fuchs

16:40 – 17:05

Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps
Ginevra Giordani, Lorenzo Grassi, Silvia Onofri and Marco Pedicini

17:05 – 17:30

From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers
Jikang Lin, Jiahui He, Yanhong Fan and Meiqin Wang

8:00 – 9:00

Registration

Conference venue


Keynote talk 2

09:00 – 10:00

The Unbearable Lightness of Symmetric Primitives
Keynote speaker: Anne Canteaut


Session 4: Protocols

10:00 – 10:25

Applications of Timed-release Encryption with Implicit Authentication
Angelique Faye Loe, Liam Medley, Christian O’Connell and Elizabeth Quaglia

10:25 – 10:50

Impossibilities in Succinct Arguments: Black-box Extraction and More
Matteo Campanelli, Chaya Ganesh, Hamidreza Khoshakhlagh and Janno Siim


10:50 – 11:20

Coffee break


11:20 – 11:35

CTF Prizes


Session 5: Quantum and Post-quantum cryptography

11:35 – 12:00

The special case of cyclotomic fields in quantum algorithms for unit groups
Razvan Barbulescu and Adrien Poulalion

12:00 – 12:25

MinRank in the Head: Short Signatures from Zero-Knowledge Proofs
Gora Adj, Luis Rivera-Zamarripa and Javier Verbel

12:25 – 13:00

Take your MEDS: Digital Signatures from Matrix Code Equivalence
Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska and Monika Trimoska


13:00 – 14:30

Lunch Break


15:00 – 19:30
20:00 – …

Excursion
Gala Dinner


Add your content here…

8:00 – 9:00

Registration

Conference venue


Keynote talk 3

09:00 – 10:00

Making Sense of the Additional Signature Submissions to the NIST PQC Standardization Process
Keynote speaker: Ward Beullens


Session 6: Lattice-based Cryptography

10:00 – 10:25

Finding and Evaluating Parameters for BGV
Johannes Mono, Chiara Marcolla, Georg Land, Tim Güneysu and Najwa Aaraj

10:25 – 10:50

ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain
Pierre-Emmanuel Clet, Aymen Boudguiga, Renaud Sirdey and Martin Zuber


10:50 – 11:20

Coffee Break + Poster Presentations


Session 6 bis: Lattice-based Cryptography

11:20 – 11:45

Concrete Security from Worst-Case to Average-Case Lattice Reductions
Joel Gärtner

11:45 – 12:10

Quantum Search-to-Decision Reduction for the LWE Problem
Kyohei Sudo, Masayuki Tezuka, Keisuke Hara and Yusuke Yoshida


12:10- 14:00

Lunch Break


Session 7: Cryptanalysis

14:00 – 14:25

On the Post-Quantum Security of Classical Authenticated Encryption Schemes
Nathalie Lang and Stefan Lucks

14:25 – 14:50

Efficient computation of (3^n,3^n)-isogenies
Thomas Decru and Sabrina Kunzweiler


15:00 – 15:45

Coffee Break + Poster Presentations


Session 7 bis: Cryptanalysis

15:45 – 16:10

A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial
Boly Seck, Pierre-Louis Cayrel, Vlad-Florin Dragoi, Idy Diop, Morgan Barbier, Jean Belo Klamti, Vincent Grosso and Brice Colombier

16:10 – 16:35

Improved Cryptanalysis of the Multi-Power RSA
Abderrahmane Nitaj and Maher Boudabra


16:35 – 17:00

Concluding Remarks