Conference Program
Except when explicitly stated otherwise, all the events will take place at the main venue: Star Land Hotel Bonapriso
Tuesday, 9 July
18:00 - 20:00
Registration and Welcome
Star Land Hotel Bonapriso
Wednesday, 10 July
08:00 - 09:00
Registration
09:00 - 09:30
Opening Ceremony
09:30 - 10:30
Invited Talk 1
Chair: TBA
Security and Privacy Balance of Anonymous Tokens and Its Applications
F. Betül Durak
10:30 - 11:00
Coffee Break
11:00 - 11:25
11:25 - 11:50
11:50 - 12:20
Session 1: Symmetric key cryptography
Chair: TBA
On the Double Differential Uniformity of Vectorial Boolean Functions
Said Eddahmani and Sihem Mesnager
TooLIP: How to Find New Instances of FiLIP Cipher With Smaller Key Size and New Filters
François Gérard, Agnese Gini and Pierrick Méaux
Quasi-Optimal Permutation Ranking and Applications to PERK (Best paper award)
Alessandro Budroni, Slim Bettaieb, Marco Palumbi and Décio Luiz Gazzoni Filho
12:30 - 14:00
Lunch Break
14:00 - 14:25
14:25 - 14:50
14:50 - 15:15
Session 2: Advanced primitives (I)
Chair: TBA
CDLS: Proving Knowledge of Committed Discrete Logarithms with Soundness
Sofia Celi, Shai Levin and Joe Rowell
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
Anais Barthoulot, Olivier Blazy and Sebastien Canard
Poster Session (I)
15:15 - 15:45
Coffee Break
15:45 - 16:10
16:10 - 16:35
16:35 - 17:00
17:00 - 17:05
Session 3: Advanced primitives (II)
Chair: TBA
Efficient Oblivious Transfer for One-Sided Active Adaptive Adversaries
Isheeta Nargis
Reducing Garbled Circuit Size While Preserving Circuit Gate
Yongge Wang and Qutaibah Malluhi
iUC-Secure Distributed File Transfer From Standard Attribute-based Encryption
Gael Marcadet, Leo Robert and Pascal Lafourcade
Remarks and eventual announcements
Thursday, 11 July
08:00 - 09:00
Registration
09:00 - 09:25
09:25 - 09:50
09:50 - 10:15
10:15 - 10:40
Session 1: Post-quantum cryptography
Chair: TBA
On the Generalizations of the Rank Metric Over Finite Chain Rings
Hermann Tchatchiem Kamche and Hervé Tale Kalachi
Polynomial-Time Key-Recovery Attack on the NIST Specification of PROV
River Moreira Ferreira and Ludovic Perret
QCCA security of Fujisaki-Okamoto transformation in the Quantum Random Oracle Model
Xu Liu and Mingqiang Wang
Side-Channel Analysis of Arithmetic Encodings for Post-Quantum Cryptography: Cautionary Notes with Application to Kyber
Duyên Pay and Francois-Xavier Standaert
10:40 - 11:10
Coffee Break
11:10 - 12:10
Invited Talk 2
Chair: TBA
Privacy-preserving Machine Learning Framework
Atsuko Miyaji
12:10 - 12:25
Poster Session (II)
12:30 - 14:00
Lunch Break
14:00 - 17:30
Social Events
Visiting some of the following sites [In french]: Monuments du débarquement, de la villa Mandessi Bell, la Pagode, la Chambre de Commerce (quartier général de la France Libre), le caveau des Rois Bell, le palais des Rois Bell, les Soldats Inconnus de la guerre de 14-18, le lieu de pendaison de Douala Manga Bell, le monument de Nachtigal, l’hôpital des occidentaux, le monument de Mbappè Léppé, Mukanda Duala, le monument des lions indomptables, l’église Lottin Assame, le monument de la Nouvelle Liberté ...
18:00 - xx:xx
Conference Dinner
Venue: Restaurant Mama Africa (Maps: https://maps.app.goo.gl/HsvyZDEedvdow4dp9)
Friday, 12 July
08:00 - 09:00
Registration
09:00 - 09:25
09:25 - 09:50
09:50 - 10:15
Session 1: Elliptic curve cryptography and RSA
Chair: TBA
Special TNFS-Secure Pairings on Ordinary Genus 2 Hyperelliptic Curves
Mónica P. Arenas, Georgios Fotiadis and Elisavet Konstantinou
Same Values Analysis Attack on Weierstrass Binary Elliptic Curves
Aubain Jose Mayeukeu and Emmanuel Fouotsa
Cryptanalysis of a New Variant of the RSA Cryptosystem
Abderrahmane Nitaj, Nurul Nur Hanisah Adenan and Muhammad Rezal Bin Kamel Ariffin
10:15 - 10:45
Coffee Break
10:45 - 11:45
Invited Talk 3
Chair: TBA
The isogeny toolbox
Luca De Feo
11:45 - 13:15
Lunch Break
13:15 - 13:40
13:40 - 14:05
Session 2: Lattice-based cryptography constructions
Chair: TBA
DiTRU: A Resurrection of NTRU over Dihedral Group
Ali Raya, Vikas Kumar and Sugata Gangopachyay
Guidance for Efficient Selection of Secure Parameters for Fully Homomorphic Encryption
Elena Kirshanova, Chiara Marcolla and Sergi Rovira
14:05 - 14:35
Coffee Break
14:35 - 15:00
15:00 - 15:25
15:25 - 15:40
15:40 - 16:00
Session 3: Lattice-based cryptography cryptanalysis
Chair: TBA
Finding Dense Submodules with Algebraic Lattice Reduction
Alexander Karenin and Elena Kirshanova
The Cool and the Cruel: Separating Hard Parts of LWE Secrets
Niklas Nolte, Mohamed Mahlou, Emily Wenger, Cathy Li, Samuel Stevens, Francois Charton and Kristin Lauter
Various Announcements
Closing Ceremony