Conference Program

Except when explicitly stated otherwise, all the events will take place at the main venue: Star Land Hotel Bonapriso

Tuesday, 9 July

18:00 - 20:00  

 Registration and Welcome

 Star Land Hotel Bonapriso

Wednesday, 10 July

08:00 - 09:00 

Registration

09:00 - 09:30

Opening Ceremony





09:30 - 10:30

Invited Talk 1

Chair: TBA


Security and Privacy Balance of Anonymous Tokens and Its Applications

F. Betül Durak

10:30 - 11:00

Coffee Break





11:00 - 11:25



11:25 - 11:50 



11:50 - 12:20

Session 1: Symmetric key cryptography

Chair: TBA


On the Double Differential Uniformity of Vectorial Boolean Functions

Said Eddahmani and Sihem Mesnager


TooLIP: How to Find New Instances of FiLIP Cipher With Smaller Key Size and New Filters

François Gérard, Agnese Gini and Pierrick Méaux


Quasi-Optimal Permutation Ranking and Applications to PERK (Best paper award)

Alessandro Budroni, Slim Bettaieb, Marco Palumbi and Décio Luiz Gazzoni Filho

12:30 - 14:00

Lunch Break





14:00 - 14:25



14:25 - 14:50 



14:50 - 15:15

Session 2: Advanced primitives (I)

Chair: TBA


CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness

Sofia Celi, Shai Levin and Joe Rowell


Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs

Anais Barthoulot, Olivier Blazy and Sebastien Canard


Poster Session (I)

15:15 - 15:45

Coffee Break





15:45 - 16:10



16:10 - 16:35



16:35 - 17:00



17:00 - 17:05

Session 3: Advanced primitives (II)

Chair: TBA


Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries

Isheeta Nargis


Reducing Garbled Circuit Size While Preserving Circuit Gate

Yongge Wang and Qutaibah Malluhi


iUC-Secure Distributed File Transfer From Standard Attribute-based Encryption

Gael Marcadet, Leo Robert and Pascal Lafourcade


Remarks and eventual announcements

Thursday, 11 July

08:00 - 09:00 

 Registration





09:00 - 09:25 



09:25 - 09:50



09:50 - 10:15



10:15 - 10:40

Session 1:  Post-quantum cryptography

Chair: TBA


On the Generalizations of the Rank Metric Over Finite Chain Rings

Hermann Tchatchiem Kamche and Hervé Tale Kalachi


Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV

River Moreira Ferreira and Ludovic Perret


QCCA security of Fujisaki-Okamoto transformation in the Quantum Random Oracle Model

Xu Liu and Mingqiang Wang


Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber

Duyên Pay and Francois-Xavier Standaert

10:40 - 11:10

Coffee Break





11:10 - 12:10

Invited Talk 2

Chair: TBA


Privacy-preserving Machine Learning Framework

Atsuko Miyaji

12:10 - 12:25

Poster Session (II)

12:30 - 14:00

Lunch Break

14:00 - 17:30

Social Events

Visiting some of the following sites [In french]: Monuments du débarquement, de la villa Mandessi Bell, la Pagode, la Chambre de Commerce (quartier général de la France Libre), le caveau des Rois Bell, le palais des Rois Bell, les Soldats Inconnus de la guerre de 14-18, le lieu de pendaison de Douala Manga Bell, le monument de Nachtigal, l’hôpital des occidentaux, le monument de Mbappè Léppé, Mukanda Duala, le monument des lions indomptables, l’église Lottin Assame, le monument de la Nouvelle Liberté ...

18:00 - xx:xx

Conference Dinner

Venue: Restaurant Mama Africa (Maps: https://maps.app.goo.gl/HsvyZDEedvdow4dp9)

Friday, 12 July

08:00 - 09:00 

 Registration





09:00 - 09:25



09:25 - 09:50



09:50 - 10:15

Session 1: Elliptic curve cryptography and RSA

Chair: TBA


Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves

Mónica P. Arenas, Georgios Fotiadis and Elisavet Konstantinou


Same Values Analysis Attack on Weierstrass Binary Elliptic Curves

Aubain Jose Mayeukeu and Emmanuel Fouotsa


Cryptanalysis of a New Variant of the RSA Cryptosystem

Abderrahmane Nitaj, Nurul Nur Hanisah Adenan and Muhammad Rezal Bin Kamel Ariffin

10:15 - 10:45

Coffee Break





10:45 - 11:45

Invited Talk 3

Chair: TBA


The isogeny toolbox

Luca De Feo

11:45 - 13:15

Lunch Break





13:15 - 13:40



13:40 - 14:05

Session 2: Lattice-based cryptography constructions

Chair: TBA


DiTRU: A Resurrection of NTRU over Dihedral Group

Ali Raya, Vikas Kumar and Sugata Gangopachyay


Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption

Elena Kirshanova, Chiara Marcolla and Sergi Rovira

14:05 - 14:35

Coffee Break





14:35 - 15:00



15:00 - 15:25



15:25 - 15:40


15:40 - 16:00

Session 3: Lattice-based cryptography cryptanalysis

Chair: TBA


Finding Dense Submodules with Algebraic Lattice Reduction

Alexander Karenin and Elena Kirshanova


The Cool and the Cruel: Separating Hard Parts of LWE Secrets

Niklas Nolte, Mohamed Mahlou, Emily Wenger, Cathy Li, Samuel Stevens, Francois Charton and Kristin Lauter


Various Announcements


Closing  Ceremony