Main Program
Wednesday (2023-11-29) | |
---|---|
KST 09:30 – 09:40 UTC 12:30 – 12:40 |
Opening Remarks |
KST 09:40 – 11:00 UTC 12:40 – 02:00 |
Session 1 : Cryptanalysis & Quantum Cryptanalysis I (Session Chair : Prof. Suhri Kim (Sungshin Women's University)) |
Enhancing the Related-Key Security of PIPO through New Key Schedules Seungjun Baek, Giyoon Kim, Yongjin Jeon and Jongsung Kim |
|
Optimized Quantum Implementation of SEED Yujin Oh, Kyoungbae Jang, Yu-Jin Yang and Hwajeong Seo |
|
Depth-Optimized Quantum Implementation of ARIA Yu-Jin Yang, Kyung-bae Jang, Yu-jin Oh and Hwa-Jeong Seo |
|
Finding Shortest Vector using Quantum NV Sieve on Grover Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn and Hwajeong Seo |
|
KST 11:00 – 11:10 UTC 02:00 – 02:10 |
Break Time |
KST 11:10 – 12:10 UTC 02:10 – 03:10 |
Session 2 : Side Channel Attack I (Session Chair : Dr. Byoungjin Seok (Seoul National University of Science and Technology)) |
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages Shunsuke Osaki and Noboru Kunihiro |
|
Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure Keonhee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh and Dong-Guk Han |
|
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis Yen-Ting Kuo and Atsushi Takayasu |
|
KST 12:10 – 13:30 UTC 03:10 – 04:30 |
Break Time (Lunch Time in Korea) |
KST 13:30 – 14:30 UTC 04:30 – 05:30 |
Session 3 : Cyber Security I (Session Chair : Prof. Seung-Hyun Seo (Hanyang University)) |
A Comparative Analysis of Rust-Based SGX Frameworks: Implications for building SGX applications Heekyung Shin, Jiwon Ock, Hyeon No and Seongmin Kim |
|
BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols Min Jang, Yuna Hwang, Yonghwi Kwon and Hyoungshick Kim |
|
mdTLS: How to make middlebox-aware TLS more efficient? Taehyun Ahn, Jiwon Kwak and Seungjoo Kim |
|
KST 14:30 – 14:40 UTC 05:30 – 05:40 |
Break Time |
KST 14:40 – 15:40 UTC 05:40 – 06:40 |
Session 4 : Cyber Security II & Side Channel Attack II (Session Chair : Prof. Kwangsu Lee (Sejong University)) |
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing Seyeon Jeong, Eunbi Hwang, Yeongpil Cho and Taekyoung Kwon |
|
Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras Yeon-Ji Lee, Na-Eun Park and Il-Gu Lee |
|
Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Case Study of Kyber Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen and Haotong Xu |
|
KST 15:40 – 15:50 UTC 06:40 – 06:50 |
Break Time |
KST 15:50 – 17:10 UTC 06:50 – 08:10 |
Session 5 : Applied Cryptography I (Session Chair : Dr. Dongyoung Roh (National Security Research Institute)) |
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han and Shijie Jia |
|
Leakage-Resilient Attribute-based Encryption with Attribute-hiding Yijian Zhang, Yunhao Ling, Jie Chen and Luping Wang |
|
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners Shun Uchizono, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto |
|
Single-Shuffle Card-Based Protocols with Six Cards per Gate Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto |
Thursday (2023-11-30) | |
---|---|
KST 10:00 – 11:00 UTC 01:00 – 02:00 |
[Invited Talk I] (Session Chair : Prof. Hwajeong Seo (Hansung University)) Title: Secure Implementation of Post-Quantum Cryptography: Challenges and Opportunities Prof. Rei Ueno (Tohoku University) |
KST 11:00 – 11:10 UTC 02:00 – 02:10 |
Break Time |
KST 11:10 – 12:10 UTC 02:10 – 03:10 |
Session 6 : Signature Schemes (Session Chair : Prof. Mun-Kyu Lee (Inha University)) |
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost Masayuki Tezuka and Keisuke Tanaka |
|
Compact Identity-based Signature and Puncturable Signature from SQISign Surbhi Shaw and Ratna Dutta |
|
High Weight Code-based Signature Scheme from QC-LDPC Codes Chik How Tan and Theo Fanuela Prabowo |
|
KST 12:10 – 13:30 UTC 03:10 – 04:30 |
Break Time (Lunch Time in Korea) |
KST 13:30 – 14:30 UTC 04:30 – 05:30 |
[Invited Talk II] (Session Chair : Prof. Joonwoo Lee (Chungang University, Korea)) Title: CryptAttackTester: Formalizing Attack Analyses Dr. Tung Chou (Academia Sinica) |
KST 14:30 – 14:40 UTC 05:30 – 05:40 |
Break Time |
KST 14:40 – 16:00 UTC 05:40 – 07:00 |
Session 7 : Applied Cryptography II & Quantum Cryptanalysis II (Session Chair : Prof. Yongwoo Lee (Inha University, Korea)) |
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe |
|
Finsler Encryption Tetsuya Nagano and Hiroaki Anada |
|
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Noboru Kunihiro and Tetsuya Izu |
|
Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim |
|
KST 16:00 – 16:10 UTC 07:00 – 07:10 |
Break Time |
KST 16:10 – 17:10 UTC 07:10 – 08:10 |
Session 8 : Korean Post Quantum Cryptography (Session Chair : Prof. Seongmin Kim (Sungshin Women's University)) |
Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation Kwangjo Kim |
|
Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator Suhri Kim, Eunmin Lee, Joohee Lee, Minju Lee and Hyun A Noh |
|
On the security of REDOG Tanja Lange, Alex Pellegrini and Alberto Ravagnani |
|
KST 17:10 – 18:00 UTC 08:10 – 09:00 |
Break Time |
KST 18:00 – 20:30 UTC 09:00 – 11:30 |
Banquet (Hotel Koreana Diamond Hall 2F) |
Friday (2023-12-01) | |
---|---|
KST 10:00 – 11:00 UTC 01:00 – 02:00 |
[Invited Talk Ⅲ] (Session Chair : Prof. Hwajeong Seo (Hansung University)) Title: Hash Based Signatures and Ascon-Sign Dr. Anubhab Baksi (Nanyang Technological University) |
KST 11:00 – 11:10 UTC 02:00 – 02:10 |
Break Time |
KST 11:10 – 12:30 UTC 02:10 – 03:30 |
Session 9 : Cryptanalysis & Applied Cryptography III (Session Chair : Dr. Taehwan Park (National Security Research Institute)) |
Distinguisher and Related-Key Attack on HALFLOOP-96 Jinpeng Liu and Ling Sun |
|
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test Yan Yan, Elisabeth Oswald and Arnab Roy |
|
Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets Zhenzhen Li, Xue Zihan and Wei Song |
|
Revisiting Key Switching Techniques with Applications to Light-Key FHE Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu and Kunpeng Wang |
|
Farewell |