Schedule
8:30 AM – 9:00 AM
ITC 307
SAC Summer School - Registration
9:00 AM – 10:30 AM
ITC 317
SAC Summer School - Lattice-based cryptography, Part 1
A tutorial on lattice-based cryptography
Adeline Roux-Langlois, CNRS, GREYC, France
10:30 AM – 11:00 AM
ITC 307
Coffee Break
11:00 AM – 12:15 PM
ITC 317
SAC Summer School - Lattice-based cryptography, Part 2
A tutorial on lattice-based cryptography
Adeline Roux-Langlois, CNRS, GREYC, France
12:15 PM – 1:15 PM
ITC 307
Lunch
1:15 PM – 2:45 PM
ITC 317
SAC Summer School - Post-quantum cryptography, Part 1
A tutorial on post-quantum cryptography
David Jao, University of Waterloo, Canada
2:45 PM – 3:15 PM
ITC 307
Coffee Break
3:15 PM – 4:30 PM
ITC 317
SAC Summer School - Post-quantum cryptography, Part 2
A tutorial on post-quantum cryptography
David Jao, University of Waterloo, Canada
9:00 AM – 10:30 AM
ITC 317
SAC Summer School - Linear and differential cryptanalysis, Part 1
A tutorial on linear and differential cryptanalysis
Tim Beyne, KU Leuven, Belgium
10:30 AM – 11:00 AM
ITC 307
Coffee Break
11:00 AM – 12:15 PM
ITC 317
SAC Summer School - Linear and differential cryptanalysis, Part 2
A tutorial on linear and differential cryptanalysis
Tim Beyne, KU Leuven, Belgium
12:15 PM – 1:15 PM
ITC 307
Lunch
1:15 PM – 2:45 PM
ITC 317
SAC Summer School - Physical attacks and countermeasures, Part 1
Tim Güneysu, Ruhr-Universität Bochum, Germany
2:45 PM – 3:15 PM
ITC 307
Coffee Break
3:15 PM – 4:30 PM
ITC 317
SAC Summer School - Physical attacks and countermeasures, Part 2
Tim Güneysu, Ruhr-Universität Bochum, Germany
8:30 AM – 9:15 AM
ITC 307
Registration
Pick up your badge
9:15 AM – 9:25 AM
ITC 317
Opening Remarks
by Dr. Benedicenti and Dr. Ghorbani
9:25 AM – 10:25 PM
ITC 317
Invited lecture - Hardware Security - Directions and Challenges
Tim Güneysu, Ruhr-Universität Bochum
10:25 AM – 10:55 AM
ITC 307
Coffee Break
10:55 AM – 12:25 PM
ITC 317
Cryptanalysis of lightweight ciphers
More Balanced Polynomials: Cube Attacks on 810- and 825- Round of Trivium with Practical Complexity
by Hao Lei, Jiahui He, Kai Hu and Meiqin Wang
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
by Xiaorui Yu, Fukang Liu, Gaoli Wang, Siwei Sun and Willi Meier
Improving the Rectangle Attack on GIFT-64
by Yincen Chen, Nana Zhang, Xuanyu Liang, Ling Song, Qianqian Yang and Zhuohui Feng
12:25 PM – 1:45 PM
ITC 307
Lunch break
Lunch is included
1:45 PM – 3:15 PM
ITC 317
Side-channel attacks and countermeasures
Mask Compression: High-Order Masking on Memory-Constrained Devices
by Markku-Juhani Saarinen and Mélissa Rossi
Not so Difficult in the End: Breaking the Lookup Table-based Affine Masking Scheme
by Lichao Wu, Guilherme Perin and Stjepan Picek
Threshold Implementations with Non-Uniform Inputs
by Siemen Dhooghe and Artemii Ovchinnikov
3:15 PM – 3:45 PM
ITC 307
Coffee Break
3:45 PM – 5:15 PM
ITC 317
Post-quantum constructions
SMAUG: Pushing Lattice-based Key Encapsulation Mechanisms to the Limits
by Jung Hee Cheon, Hyeongmin Choe, Dongyeon Hong and MinJune Yi
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
by Andrea Basso
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
by Wei Wei, Min Luo, Zijian Bao, Cong Peng and Debiao He
5:15 PM – 6:15 PM
ITC 317
Reception
9:00 AM – 10:00 AM
ITC 317
Stafford Tavares Invited Lecture - Robust and Non-malleable Threshold Schemes, AMD codes and External Difference Families
Doug Stinson
10:00 AM – 10:30 AM
ITC 307
Coffee Break
10:30 AM – 12:00 AM
ITC 317
Symmetric cryptography and fault attacks
The Random Fault Model
by Siemen Dhooghe and Svetla Nikova
Probabilistic Related-Key Statistical Saturation Cryptanalysis
by Muzhou Li, Nicky Mouha, Ling Sun and Meiqin Wang
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher
by Shoichi Hirose and Kazuhiko Minematsu
12:00 PM – 2:00 PM
Lunch break
Lunch is included
2:00 PM – 3:30 PM
ITC 317
Post-quantum analysis and implementations
Bit Security Analysis of Lattice-Based KEMs under Plaintext-Checking Attacks
by Ruiqi Mi, Haodong Jiang and Zhenfeng Zhang
Quantum Cryptanalysis of OTR and OPP: Attacks on Confidentiality, and Key-Recovery
by Melanie Jauch and Varun Maram
Fast and Efficient Hardware Implementation of HQC
by Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz and Jakub Szefer
3:30 PM – 4:00 PM
ITC 307
Coffee Break
4:00 PM – 5:00 PM
ITC 317
6:00 PM – 9:00 PM
Banquet at the Wu Conference Centre
9:00 AM – 10:00 AM
ITC 317
Invited lecture - A geometric approach to symmetric-key cryptanalysis
Tim Beyne
10:00 AM – 10:30 AM
ITC 307
Coffee Break
10:30 AM – 11:00 AM
ITC 317
11:00 AM – 12:30 PM
ITC 317
Differential cryptanalysis
CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives
by Emanuele Bellini, David Gerault, Juan Grados, Yun Ju Huang, Rusydi Makarim, Mohamed Rachidi and Sharwan Tiwari
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
by Kosei Sakamoto, Ryoma Ito and Takanori Isobe
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon
by Amirhossein Ebrahimi Moghaddam, David Gerault and Paolo Palmieri
