Main Program


Wednesday (2025-11-19)

KST 13:30 – 14:45
UTC 04:30 – 05:45
(Hall: Auditorium)

Session 1: AI-Driven Threat Detection & Federated Learning

(Session Chair : Universiti Tunku Abdul Rahman Prof. Wai Kong Lee)

Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages

Bo Wang, Imran Khan, Martin White, and Natalia Beloff

Tabular or Image Input? Transformers for NIDS: A Comparative Study

Loreen Mahmoud, Aafia Hussain, and Sugata Gangopadhyay

AdvCodeGen: Adversarial Code Generation via Large Language Models

Eun Jung, Jiacheng Li, Yonghwi Kwon, and Hyoungshick Kim

KST 14:45 – 15:00
UTC 05:45 – 06:00

Break Time

KST 15:00 – 15:50
UTC 06:00 – 06:50
(Hall: Auditorium)

[Invited Talk I]
(Session Chair : Kangwon National University, Prof. Dongjae Lee)
Lattice-based Proof Systems and Application to Homomorphic Encryptions
Yongsoo Song

KST 15:50 – 16:05
UTC 06:50 – 07:05

Break Time

KST 16:05 – 17:20
UTC 07:05 – 08:20
(Hall: Auditorium)

Session 2: Generative & Steganographic Security Applications
(Session Chair : Korea Institute of Science and Technology Information, Dr. Woojin Seok)

Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification

So-Yeon Yoon and Hyun Kwon

Code Region Extraction Improves Scalable IoT Malware Clustering with Respect to Functional Labels

Kosuke Nikawa, Chansu Han, Akira Tanaka, Kazuki Iwamoto, Takeshi Takahashi, and Jun’ichi Takeuchi

PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies

Juryeok Kim and Youngjoo Shin

 

Thursday (2025-11-20)

KST 09:35 – 10:50
UTC 00:00 – 01:50
(Hall: Auditorium)

Session 3 : Post-Quantum Cryptography & Migration
(Session Chair : Hanyang University, Prof. Seunghyun Seo)

Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach

Minjoo Sim, Subin Jo, Hyuntae Song, Eunseong Kim, and Hwajeong Seo

On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment

Hyunmin Kim

Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption

Yui Tsuchiya, Toi Tomita, and Junji Shikata

KST 09:35 – 10:50
UTC 00:00 – 01:50
(Hall: Conference A)

Session 4 : Side-Channel & Fault Analysis in PQC
(Session Chair : Sungshin Women’s University, Prof. Yongha Son)

Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method

Yaoling Ding, Haotong Xu, Chong Luo, Annyu Liu, Zheyu Zhang, Jing Yu, and An Wang

Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion

Gwang-sik Kim and Young-sik Kim

Quantum Circuit Implementation and Resource Analysis of AIM2

Gyeongju Song, Kyungbae Jang, Seyoung Yoon, Minwoo Lee, and Hwajeong Seo

KST 10:50 – 11:10
UTC 01:50 – 02:10

Break Time

KST 11:10 – 12:00
UTC 02:10 – 03:00

[Invited Talk II]
(Session Chair : Hansung University, Prof. Hwajeong Seo)

Accelerating Post-quantum Cryptography and Functional Encryption with Massively Parallel Architecture

Wai Kong Lee

KST 12:00 – 13:30
UTC 03:00 – 04:30

Break Time (Lunch Time in Korea)

KST 13:30 – 15:10
UTC 04:30 – 06:10
(Hall: Auditorium)

Session 5 : Network & Application Security
(Session Chair : Lund University, Dr. Anubhab Baksi)

Comprehensive Security Analysis of End-to-End Encryption in LINE

Takehiro Matsumoto, Atsushi Tanaka, Kyosuke Yamashita, Ryoma Ito, and Takanori Isobe

Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection

Geunwoo Baek, Jiwon Kwak, and Seungjoo Kim

Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function

Shoichi Hirose, Tetsu Iwata, and Hidenori Kuwakado

KST 13:30 – 15:10
UTC 04:30 – 06:10
(Hall: Conference A)

Session 6 : Quantum Cryptanalysis & Theoretical Limits
(Session Chair : Electronics and Telecommunications Research Institute, Dr. Keonwoo Kim)

Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare

Anik Basu Bhaumik, Suman Dutta, Siyi Wang, Anubhab Baksi, Kyungbae Jang, Amit Saha, Hwajeong Seo, and Anupam Chattopadhyay

(Best Paper) Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256

Jaeyeon Lee, Seunghyun Cho, Saehoon Jung, Young-Sik Kim

Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function

Zhuoxi Lin and Chun Guo

Impossibility Results of Card-Based Protocols via Mathematical Optimization

Shunnosuke Ikeda and Kazumasa Shinagawa

KST 15:10 – 15:25
UTC 06:10 – 06:25

Break Time

KST 15:25 – 16:40
UTC 06:25 – 07:40
(Hall: Auditorium)

Session 7 : Implementation & Hardware Acceleration

(Session Chair : Electronics and Telecommunications Research Institute, Dr. Yousung Kang)

High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers

Minjoo Sim, Hyunjun Kim, Minwoo Lee, and Hwajeong Seo

Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU

Siwoo Eum, Minho Song, Minjoo Sim, and Hwajeong Seo

Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation

Leila Ben Abdelghani Bouraoui, Nadia El Mrabet, Loubna Ghammam, and Lina Mortajine

KST 15:25 – 16:40
UTC 06:25 – 07:40
(Hall: Conference A)

Session 8 : Symmetric Cryptanalysis & New Constructions

(Session Chair : Chosun University, Prof. Hyunil Kim)

On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks

Namil Kim, Wonwoo Song, Seungjun Baek, Yongjin Jeon, Jongsung Kim, and Ki Hyo Nam

(Best Paper) On the Weak Differential Resistance of MGFN and the Exploration of Variants

Bingqing Li and Ling Sun

New Derivation Rule for Linear Approximations and Its Application to ChaCha

Zhengting Li, Lin Ding, Xinhai Wang, Honglei Wang, and Jiang Wan

KST 16:40 – 16:55

UTC 07:40 – 07:55

Break Time

KST 16:55 – 17:45
UTC 07:55 – 08:45
(Hall: Auditorium)

[Invited Talk III]
(Session Chair : Hansung University, Prof. Hwajeong Seo)

Non-Malleable Encryption from QC-MDPC Codes

Anubhab Baksi

KST 17:45 – 18:00
UTC 08:45 – 09:00

Break Time

KST 18:00 – 20:30
UTC 09:00 – 11:30
(Hall: Conference A)

Banquet

 

 

Friday (2025-11-21)

KST 10:00 – 10:50
UTC 01:00 – 01:50
(Hall: Auditorium)

[Invited Talk IV]
(Session Chair : Hansung University, Prof. Hwajeong Seo)

Relaxed Vector Commitment for Shorter Signatures

Seongkwang Kim

KST 10:50 – 11:05
UTC 01:50 – 02:05

Break Time

KST 11:05 – 12:20
UTC 02:05 – 03:20
(Hall: Auditorium)

Session 9 : Advanced Cryptographic Protocols & Signatures

(Session Chair : National Security Research Institute, Dr. Nari Lee)

Strong Designated Verifier Signatures with Non-delegatability from CSIDH

Hiroki Minamide, Keisuke Tanaka, and Masayuki Tezuka

An Undeniable Signature Scheme Utilizing Module Lattices

Kunal Dey, Mansi Goyal, Aditi Kar Gangopadhyay, and Bhupendra Singh

A Witness Encryption for Quadratic Arithmetic Programs

Tao-Hsiang Chang, Yu-Chen Wu, Zi-Yuan Liu, Jen Chieh Hsu, Raylin Tso, and Masahiro Mambo

 

Farewell