Schedule
8:30 AM – 9:00 AM
ITC 307
SAC Summer School - Registration
9:00 AM – 10:30 AM
ITC 317
SAC Summer School - Lattice-based cryptography, Part 1
A tutorial on lattice-based cryptography
Adeline Roux-Langlois, CNRS, GREYC, France
10:30 AM – 11:00 AM
ITC 307
Coffee Break
11:00 AM – 12:15 PM
ITC 317
SAC Summer School - Lattice-based cryptography, Part 2
A tutorial on lattice-based cryptography
Adeline Roux-Langlois, CNRS, GREYC, France
12:15 PM – 1:15 PM
ITC 307
Lunch
1:15 PM – 2:45 PM
ITC 317
SAC Summer School - Post-quantum cryptography, Part 1
A tutorial on post-quantum cryptography
David Jao, University of Waterloo, Canada
2:45 PM – 3:15 PM
ITC 307
Coffee Break
3:15 PM – 4:30 PM
ITC 317
SAC Summer School - Post-quantum cryptography, Part 2
A tutorial on post-quantum cryptography
David Jao, University of Waterloo, Canada
9:00 AM – 10:30 AM
ITC 317
SAC Summer School - Linear and differential cryptanalysis, Part 1
A tutorial on linear and differential cryptanalysis
Tim Beyne, KU Leuven, Belgium
10:30 AM – 11:00 AM
ITC 307
Coffee Break
11:00 AM – 12:15 PM
ITC 317
SAC Summer School - Linear and differential cryptanalysis, Part 2
A tutorial on linear and differential cryptanalysis
Tim Beyne, KU Leuven, Belgium
12:15 PM – 1:15 PM
ITC 307
Lunch
1:15 PM – 2:45 PM
ITC 317
SAC Summer School - Physical attacks and countermeasures, Part 1
Tim Güneysu, Ruhr-Universität Bochum, Germany
2:45 PM – 3:15 PM
ITC 307
Coffee Break
3:15 PM – 4:30 PM
ITC 317
SAC Summer School - Physical attacks and countermeasures, Part 2
Tim Güneysu, Ruhr-Universität Bochum, Germany
8:30 AM – 9:15 AM
ITC 307
Registration
Pick up your badge
9:15 AM – 9:25 AM
ITC 317
Opening Remarks
by Dr. Benedicenti and Dr. Ghorbani
9:25 AM – 10:25 PM
ITC 317
Invited lecture - Hardware Security - Directions and Challenges
Tim Güneysu, Ruhr-Universität Bochum
10:25 AM – 10:55 AM
ITC 307
Coffee Break
10:55 AM – 12:25 PM
ITC 317
Cryptanalysis of lightweight ciphers
More Balanced Polynomials: Cube Attacks on 810- and 825- Round of Trivium with Practical Complexity
by Hao Lei, Jiahui He, Kai Hu and Meiqin Wang
• pre-proceeding version (PDF)
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
by Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun and Willi Meier
• pre-proceeding version (PDF)
Improving the Rectangle Attack on GIFT-64
by Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang and Zhuohui Feng
• pre-proceeding version (PDF)
12:25 PM – 1:45 PM
ITC 307
Lunch break
Lunch is included
1:45 PM – 3:15 PM
ITC 317
Side-channel attacks and countermeasures
Mask Compression: High-Order Masking on Memory-Constrained Devices
by Markku-Juhani Saarinen and Mélissa Rossi
• pre-proceeding version (PDF)
Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme
by Lichao Wu, Guilherme Perin and Stjepan Picek
• pre-proceeding version (PDF)
Threshold Implementations with Non-Uniform Inputs
by Siemen Dhooghe and Artemii Ovchinnikov
• pre-proceeding version (PDF)
3:15 PM – 3:45 PM
ITC 307
Coffee Break
3:45 PM – 5:15 PM
ITC 317
Post-quantum constructions
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
by Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong and MinJune Yi
• pre-proceeding version (PDF)
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
by Andrea Basso
• pre-proceeding version (PDF)
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
by Wei Wei, Min Luo, Zijian Bao, Cong Peng and Debiao He
• pre-proceeding version (PDF)
5:15 PM – 6:15 PM
ITC 317
Reception
9:00 AM – 10:00 AM
ITC 317
Stafford Tavares Invited Lecture - Robust and Non-malleable Threshold Schemes, AMD codes and External Difference Families
Doug Stinson
10:00 AM – 10:30 AM
ITC 307
Coffee Break
10:30 AM – 12:00 AM
ITC 317
Symmetric cryptography and fault attacks
The Random Fault Model
by Siemen Dhooghe and Svetla Nikova
• pre-proceeding version (PDF)
Probabilistic Related-Key Statistical Saturation Cryptanalysis
by Muzhou Li, Nicky Mouha, Ling Sun and Meiqin Wang
• pre-proceeding version (PDF)
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
by Shoichi Hirose and Kazuhiko Minematsu
• pre-proceeding version (PDF)
12:00 PM – 2:00 PM
Lunch break
Lunch is included
2:00 PM – 3:30 PM
ITC 317
Post-quantum analysis and implementations
Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks
by Ruiqi Mi, Haodong Jiang and Zhenfeng Zhang
• pre-proceeding version (PDF)
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
by Melanie Jauch and Varun Maram
• pre-proceeding version (PDF)
Fast and Efficient Hardware Implementation of HQC
by Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz and Jakub Szefer
• pre-proceeding version (PDF)
3:30 PM – 4:00 PM
ITC 307
Coffee Break
4:00 PM – 5:00 PM
ITC 317
Homomorphic encryption
On the Precision Loss in Approximate Homomorphic Encryption
by Anamaria Costache, Benjamin Curtis, Erin Hales, Sean Murphy, Tabitha Ogilvie and Rachel Player
• pre-proceeding version (PDF)
Secure Function Extensions to Additively Homomorphic Cryptosystems
by Mounika Pratapa and Aleksander Essex
• pre-proceeding version (PDF)
6:00 PM – 9:00 PM
Banquet at the Wu Conference Centre
9:00 AM – 10:00 AM
ITC 317
Invited lecture - A geometric approach to symmetric-key cryptanalysis
Tim Beyne
10:00 AM – 10:30 AM
ITC 307
Coffee Break
10:30 AM – 11:00 AM
ITC 317
Public-key cryptography
Generalized Implicit Factorization Problem
by Yansong Feng, Abderrahmane Nitaj and Yanbin Pan
• pre-proceeding version (PDF)
11:00 AM – 12:30 PM
ITC 317
Differential cryptanalysis
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
by Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Rusydi Makarim, Mohamed Rachidi and Sharwan Tiwari
• pre-proceeding version (PDF)
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
by Kosei Sakamoto, Ryoma Ito and Takanori Isobe
• pre-proceeding version (PDF)
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon
by Amirhossein Ebrahimi Moghaddam, David Gerault and Paolo Palmieri
• pre-proceeding version (PDF)