Main Program
|
KST 13:30 – 14:45 |
Session 1: AI-Driven Threat Detection & Federated Learning (Session Chair : Universiti Tunku Abdul Rahman Prof. Wai Kong Lee) |
|
Role-Aware Multi-modal Federated Learning System for Detecting Phishing Webpages Bo Wang, Imran Khan, Martin White, and Natalia Beloff |
|
|
Tabular or Image Input? Transformers for NIDS: A Comparative Study Loreen Mahmoud, Aafia Hussain, and Sugata Gangopadhyay |
|
|
AdvCodeGen: Adversarial Code Generation via Large Language Models Eun Jung, Jiacheng Li, Yonghwi Kwon, and Hyoungshick Kim |
|
|
KST 14:45 – 15:00 |
Break Time |
|
KST 15:00 – 15:50 |
[Invited Talk I] |
|
KST 15:50 – 16:05 |
Break Time |
|
KST 16:05 – 17:20 |
Session 2: Generative & Steganographic Security Applications |
|
Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification So-Yeon Yoon and Hyun Kwon |
|
|
Code Region Extraction Improves Scalable IoT Malware Clustering with Respect to Functional Labels Kosuke Nikawa, Chansu Han, Akira Tanaka, Kazuki Iwamoto, Takeshi Takahashi, and Jun’ichi Takeuchi |
|
|
PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies Juryeok Kim and Youngjoo Shin |
|
|
Thursday (2025-11-20) |
|
|
KST 09:35 – 10:50 |
Session 3 : Post-Quantum Cryptography & Migration |
|
Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach Minjoo Sim, Subin Jo, Hyuntae Song, Eunseong Kim, and Hwajeong Seo |
|
|
On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment Hyunmin Kim |
|
|
Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption Yui Tsuchiya, Toi Tomita, and Junji Shikata |
|
|
KST 09:35 – 10:50 |
Session 4 : Side-Channel & Fault Analysis in PQC |
|
Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method Yaoling Ding, Haotong Xu, Chong Luo, Annyu Liu, Zheyu Zhang, Jing Yu, and An Wang |
|
|
Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion Gwang-sik Kim and Young-sik Kim |
|
|
Quantum Circuit Implementation and Resource Analysis of AIM2 Gyeongju Song, Kyungbae Jang, Seyoung Yoon, Minwoo Lee, and Hwajeong Seo |
|
|
KST 10:50 – 11:10 |
Break Time |
|
KST 11:10 – 12:00 |
[Invited Talk II] Accelerating Post-quantum Cryptography and Functional Encryption with Massively Parallel Architecture Wai Kong Lee |
|
KST 12:00 – 13:30 |
Break Time (Lunch Time in Korea) |
|
KST 13:30 – 15:10 |
Session 5 : Network & Application Security |
|
Comprehensive Security Analysis of End-to-End Encryption in LINE Takehiro Matsumoto, Atsushi Tanaka, Kyosuke Yamashita, Ryoma Ito, and Takanori Isobe |
|
|
Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection Geunwoo Baek, Jiwon Kwak, and Seungjoo Kim |
|
|
Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function Shoichi Hirose, Tetsu Iwata, and Hidenori Kuwakado |
|
|
KST 13:30 – 15:10 |
Session 6 : Quantum Cryptanalysis & Theoretical Limits |
|
Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare Anik Basu Bhaumik, Suman Dutta, Siyi Wang, Anubhab Baksi, Kyungbae Jang, Amit Saha, Hwajeong Seo, and Anupam Chattopadhyay |
|
|
(Best Paper) Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256 Jaeyeon Lee, Seunghyun Cho, Saehoon Jung, Young-Sik Kim |
|
|
Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function Zhuoxi Lin and Chun Guo |
|
|
Impossibility Results of Card-Based Protocols via Mathematical Optimization Shunnosuke Ikeda and Kazumasa Shinagawa |
|
|
KST 15:10 – 15:25 |
Break Time |
|
KST 15:25 – 16:40 |
Session 7 : Implementation & Hardware Acceleration (Session Chair : Electronics and Telecommunications Research Institute, Dr. Yousung Kang) |
|
High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers Minjoo Sim, Hyunjun Kim, Minwoo Lee, and Hwajeong Seo |
|
|
Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU Siwoo Eum, Minho Song, Minjoo Sim, and Hwajeong Seo |
|
|
Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation Leila Ben Abdelghani Bouraoui, Nadia El Mrabet, Loubna Ghammam, and Lina Mortajine |
|
|
KST 15:25 – 16:40 |
Session 8 : Symmetric Cryptanalysis & New Constructions (Session Chair : Chosun University, Prof. Hyunil Kim) |
|
On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks Namil Kim, Wonwoo Song, Seungjun Baek, Yongjin Jeon, Jongsung Kim, and Ki Hyo Nam |
|
|
(Best Paper) On the Weak Differential Resistance of MGFN and the Exploration of Variants Bingqing Li and Ling Sun |
|
|
New Derivation Rule for Linear Approximations and Its Application to ChaCha Zhengting Li, Lin Ding, Xinhai Wang, Honglei Wang, and Jiang Wan |
|
|
KST 16:40 – 16:55 UTC 07:40 – 07:55 |
Break Time |
|
KST 16:55 – 17:45 |
[Invited Talk III] Non-Malleable Encryption from QC-MDPC Codes Anubhab Baksi |
|
KST 17:45 – 18:00 |
Break Time |
|
KST 18:00 – 20:30 |
Banquet |
|
Friday (2025-11-21) |
|
|
KST 10:00 – 10:50 |
[Invited Talk IV] Relaxed Vector Commitment for Shorter Signatures Seongkwang Kim |
|
KST 10:50 – 11:05 |
Break Time |
|
KST 11:05 – 12:20 |
Session 9 : Advanced Cryptographic Protocols & Signatures (Session Chair : National Security Research Institute, Dr. Nari Lee) |
|
Strong Designated Verifier Signatures with Non-delegatability from CSIDH Hiroki Minamide, Keisuke Tanaka, and Masayuki Tezuka |
|
|
An Undeniable Signature Scheme Utilizing Module Lattices Kunal Dey, Mansi Goyal, Aditi Kar Gangopadhyay, and Bhupendra Singh |
|
|
A Witness Encryption for Quadratic Arithmetic Programs Tao-Hsiang Chang, Yu-Chen Wu, Zi-Yuan Liu, Jen Chieh Hsu, Raylin Tso, and Masahiro Mambo |
|
|
Farewell |
|