8:30 | Registration | |
9:00 | Openning | |
10:00 | Coffee Break | |
Chairman : Yvo Desmedt | ||
10:30 | David Naccache | On Catalan Constant Continued Fractions |
11:30 | Clementine Gritti | Full Post-Quantum Datagram TLS Handshake in the Internet of Things |
12:00 | Ousmane Ndiaye | Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes |
12:45 | Lunch | |
Chairman : Atsuko Miyaji | ||
14:30 | Jannis Leuther | QCB is Blindly Unforgeable |
15:00 | Ruize Wang | A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts |
15:30 | Hussain Ahmad | A new keyed hash function based on latin squares and error-correcting codes to authenticate users in smart home environments |
16:00 | Coffee Break | |
Chairman : Jean Louis Lanet | ||
16:30 | Theo Fanuela Prabowo | Attack on a Code-based Signature Scheme from QC-LDPC Codes |
17:00 | Sugata Gangopadhyay | Computational results on Gowers U2 and U3 norms of known S-Boxes |
Chairman : Sugata Gangopadhyay | ||
09:00 | Artem Grigor/ Vincenzo Iovino | Multi-Input Non-Interactive Functional Encryption: Constructions and Applications |
09:30 | Sayantan Paul | Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher |
10:00 | Jacques Patarin | Quantum Cryptanalysis of $5$ rounds Feistel schemes and Benes schemes |
10:30 | Coffee Break | |
Chairwoman : Elena Dubrova | ||
11:00 | Atsuko Miyaji | Lattice-based accumulator with constant time list update and constant time verification |
11:30 | Ngoc Minh Phung | Malicious JavaScript detection based on AST analysis and key feature re-sampling in Realistic Environment |
12:15 | Lunch | |
Chairman : Yvo Desmedt | ||
14:00 | Philippe Gaborit | Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems |
15:00 | Evgnosia-Alexandra Kelesidis / Ilona Teodora Ciocan | Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas |
15:30 | Binh Le Thanh Thai | A Study for Security of Visual Cryptography |
16:00 | Coffee Break | |
Chairman : Nuh Aydin | ||
16:30 | Nadir Sahllal | Forecasting Click Fraud via Machine Learning Algorithms |
17:00 | Hind Idrissi / Mohammed Ennahbaoui | An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS |
Chairwoman : Sihem Mesanger | ||
09:00 | Yvo Desmedt | Cryptologists should not ignore the history of Al-Andalusia |
10:00 | Vladimir Edemskiy and Sofia Koltsova | Symmetric 4-adic complexity of quaternary sequences with period $2p^n$ |
10:30 | Coffee Break | |
Chairman : Vincenzo Iovino | ||
11:00 | Agnese Gini and Pierrick Méaux | Weightwise perfectly balanced functions and nonlinearity |
11:30 | Bastien Pacifico and Stéphane Ballet | Chudnovsky-type algorithms over the projective line using generalized evaluation maps |
Chairman : Zine-Dine Khalid | ||
12:00 | Tomohiro Sekiguchi and Hidema Tanaka | Security enhancement method using shortened error correcting codes |
12:30 | Nuah Aydin, Yiyang Lu and Vishad Onta | An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes |
13:15 | Lunch | |
14:30 | Social event |