Main Program


Wednesday (2023-11-29)
KST 09:30 – 09:40
UTC 12:30 – 12:40
Opening Remarks
KST 09:40 – 11:00
UTC 12:40 – 02:00
Session 1 : Cryptanalysis & Quantum Cryptanalysis I
(Session Chair : Prof. Suhri Kim (Sungshin Women's University))
Enhancing the Related-Key Security of PIPO through New Key Schedules
Seungjun Baek, Giyoon Kim, Yongjin Jeon and Jongsung Kim
Optimized Quantum Implementation of SEED
Yujin Oh, Kyoungbae Jang, Yu-Jin Yang and Hwajeong Seo
Depth-Optimized Quantum Implementation of ARIA
Yu-Jin Yang, Kyung-bae Jang, Yu-jin Oh and Hwa-Jeong Seo
Finding Shortest Vector using Quantum NV Sieve on Grover
Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn and Hwajeong Seo
KST 11:00 – 11:10
UTC 02:00 – 02:10
Break Time
KST 11:10 – 12:10
UTC 02:10 – 03:10
Session 2 : Side Channel Attack I
(Session Chair : Dr. Byoungjin Seok (Seoul National University of Science and Technology))
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages
Shunsuke Osaki and Noboru Kunihiro
Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure
Keonhee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh and Dong-Guk Han
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis
Yen-Ting Kuo and Atsushi Takayasu
KST 12:10 – 13:30
UTC 03:10 – 04:30
Break Time (Lunch Time in Korea)
KST 13:30 – 14:30
UTC 04:30 – 05:30
Session 3 : Cyber Security I
(Session Chair : Prof. Seung-Hyun Seo (Hanyang University))
A Comparative Analysis of Rust-Based SGX Frameworks: Implications for building SGX applications
Heekyung Shin, Jiwon Ock, Hyeon No and Seongmin Kim
BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols
Min Jang, Yuna Hwang, Yonghwi Kwon and Hyoungshick Kim
mdTLS: How to make middlebox-aware TLS more efficient?
Taehyun Ahn, Jiwon Kwak and Seungjoo Kim
KST 14:30 – 14:40
UTC 05:30 – 05:40
Break Time
KST 14:40 – 15:40
UTC 05:40 – 06:40
Session 4 : Cyber Security II & Side Channel Attack II
(Session Chair : Prof. Kwangsu Lee (Sejong University))
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing
Seyeon Jeong, Eunbi Hwang, Yeongpil Cho and Taekyoung Kwon
Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras
Yeon-Ji Lee, Na-Eun Park and Il-Gu Lee
Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Case Study of Kyber
Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen and Haotong Xu
KST 15:40 – 15:50
UTC 06:40 – 06:50
Break Time
KST 15:50 – 17:10
UTC 06:50 – 08:10
Session 5 : Applied Cryptography I
(Session Chair : Dr. Dongyoung Roh (National Security Research Institute))
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test
Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han and Shijie Jia
Leakage-Resilient Attribute-based Encryption with Attribute-hiding
Yijian Zhang, Yunhao Ling, Jie Chen and Luping Wang
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners
Shun Uchizono, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto
Single-Shuffle Card-Based Protocols with Six Cards per Gate
Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto

 

 

Thursday (2023-11-30)
KST 10:00 – 11:00
UTC 01:00 – 02:00
[Invited Talk I]
(Session Chair : Prof. Hwajeong Seo (Hansung University))

Title: Secure Implementation of Post-Quantum Cryptography: Challenges and Opportunities
Prof. Rei Ueno (Tohoku University)
KST 11:00 – 11:10
UTC 02:00 – 02:10
Break Time
KST 11:10 – 12:10
UTC 02:10 – 03:10
Session 6 : Signature Schemes
(Session Chair : Prof. Mun-Kyu Lee (Inha University))
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost
Masayuki Tezuka and Keisuke Tanaka
Compact Identity-based Signature and Puncturable Signature from SQISign
Surbhi Shaw and Ratna Dutta
High Weight Code-based Signature Scheme from QC-LDPC Codes
Chik How Tan and Theo Fanuela Prabowo
KST 12:10 – 13:30
UTC 03:10 – 04:30
Break Time (Lunch Time in Korea)
KST 13:30 – 14:30
UTC 04:30 – 05:30
[Invited Talk II]
(Session Chair : Prof. Joonwoo Lee (Chungang University, Korea))

Title: CryptAttackTester: Formalizing Attack Analyses
Dr. Tung Chou (Academia Sinica)
KST 14:30 – 14:40
UTC 05:30 – 05:40
Break Time
KST 14:40 – 16:00
UTC 05:40 – 07:00
Session 7 : Applied Cryptography II & Quantum Cryptanalysis II
(Session Chair : Prof. Yongwoo Lee (Inha University, Korea))
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy
Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe
Finsler Encryption
Tetsuya Nagano and Hiroaki Anada
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator
Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Noboru Kunihiro and Tetsuya Izu
Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis
Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim
KST 16:00 – 16:10
UTC 07:00 – 07:10
Break Time
KST 16:10 – 17:10
UTC 07:10 – 08:10
Session 8 : Korean Post Quantum Cryptography
(Session Chair : Prof. Seongmin Kim (Sungshin Women's University))
Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation
Kwangjo Kim
Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator
Suhri Kim, Eunmin Lee, Joohee Lee, Minju Lee and Hyun A Noh
On the security of REDOG
Tanja Lange, Alex Pellegrini and Alberto Ravagnani
KST 17:10 – 18:00
UTC 08:10 – 09:00
Break Time
KST 18:00 – 20:30
UTC 09:00 – 11:30
Banquet (Hotel Koreana Diamond Hall 2F)

 

 

Friday (2023-12-01)
KST 10:00 – 11:00
UTC 01:00 – 02:00
[Invited Talk Ⅲ]
(Session Chair : Prof. Hwajeong Seo (Hansung University))

Title: Hash Based Signatures and Ascon-Sign
Dr. Anubhab Baksi (Nanyang Technological University)
KST 11:00 – 11:10
UTC 02:00 – 02:10
Break Time
KST 11:10 – 12:30
UTC 02:10 – 03:30
Session 9 : Cryptanalysis & Applied Cryptography III
(Session Chair : Dr. Taehwan Park (National Security Research Institute))
Distinguisher and Related-Key Attack on HALFLOOP-96
Jinpeng Liu and Ling Sun
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test
Yan Yan, Elisabeth Oswald and Arnab Roy
Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets
Zhenzhen Li, Xue Zihan and Wei Song
Revisiting Key Switching Techniques with Applications to Light-Key FHE
Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu and Kunpeng Wang
Farewell