|
|
P.S. 🚀 New Program just launched — check it out!
20:00 – 22:00Registration at Rent-In Residence Atlas hotel:
https://www.rent-inn.ma
9:00 – 10:00Registration at ENSIAS College
10:00 – 10:30Opening Ceremony
10:30 – 11:00Coffee Break
11:00 – 11:30
One-Way Homomorphic Encryption: A Composite Group Approach
Mahdi Mahdavi, Helena Rifà-Pous Universitat Oberta de Catalunya, Spain; Shahid Beheshti University, Iran
Speaker: Jeongeun Park Affiliation: Associate Professor at NTNU, Norway Chair: Vincent Rijmen
14:00 – 14:30Activate Me!: Designing Efficient Activation Functions for Privacy-PML with Fully Homomorphic Encryption
Nges Brian Njungle, Michel A. Kinsy Arizona State University, USA
14:30 – 15:00Conjunctive Dynamic SSE Schemes under Scrutiny:
Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE
Bibhas Chandra Das Institute for
Advancing Intelligence TCG CREST, India; Chennai Mathematical Institute, India
15:00 – 15:30Efficient and Optimized Modeling of S-Boxes
Anirudh Aitipamula, Debranjan Pal, Dipanwita Roy Chowdhury Indian Institute of Technology
Kharagpur, India; Indian Institute of Technology Kanpur, India
15:30 – 16:00Tearing Solutions for Tree Traversal in Stateful
Hash-based Cryptography
Solane El Hirch, Christine van Vredendaal, Frank Custers Radboud
University Nijmegen, The Netherlands; NXP Semiconductors Eindhoven, The Netherlands
16:00 – 16:30Attribute-based Encryption using Sum-Product
Decomposition of Boolean Functions
Arani Raychaudhuri, Ramprasad Sarkar, Mriganka Mandal
Indian Statistical Institute Kolkata, India
16:30 – 17:00 Simultaneously simple universal and
indifferentiable hashing to elliptic curves
Dimitri Koshelev University of Lleida,
Catalonia, Spain
17:30 – 18:00Bivariate proximity test-based Asynchronous
Verifiable Secret Sharing
Lola-Baie Mallordy, Olivier Blazy, Daniel Augot, Hugo Delavenne
LIX, Ecole Polytechnique, Institut Polytechnique de Paris, Inria, France
18:00 – 18:30Behemoth: transparent polynomial commitment scheme
constant opening proof size and verifier time
Istvan Seres, Péter Burcsi
Eötvös Loránd University, Hungary
09:00 – 09:30A Novel Partial Key Exposure Attack on Common Prime
RSA
Mengce Zheng and Abderrahmane Nitaj Zhejiang Wanli University, China; University of
Caen Normandie, France
09:30 – 10:00Improved Cryptanalysis of an RSA Variant Based on
Cubic Pell Curve
Mohammed Rahmani and Abderrahmane Nitaj Mohammed First University,
Oujda, Morocco; University of Caen Normandie, France
10:00 – 10:30A New Generalized Attack on RSA-like
Cryptosystems
Michel SECK, Oumar Niang, Djiby Sow, Abderrahmane Nitaj, Mengce Zheng, Maher
Boudabra Ecole Polytechnique de Thies, Senegal; UCAD Dakar, Senegal; University of Caen
Normandie, France; Zhejiang Wanli University Ningbo, China; KFUPM Dhahran, Saudi Arabia
11:00 – 11:30 Convolution-Friendly Image Compression with FHE
Georgio Nicolas, Sergi Rovira, Axel Mertens COSIC, KU Leuven, Belgium; Technology
Innovation Institute, UAE
11:30 – 12:00 Leveled Homomorphic Encryption over Composite
Groups
Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi Universitat
Oberta de Catalunya, Spain; University of Delaware, USA; COSIC, KU Leuven, Belgium & Nokia Bell
Labs; University of Hamburg, Germany
Speaker: Pascal Lafourcade Affiliation: Professor of Computer Science at IUT of Clermont Auvergne, France Chair: Tako Boris Fouotsa
15:00 – 19:00 Guided visit of Rabat
20:00 – --:-- Gala dinner
09:00 – 09:30An Improvement of the Congruence Solver of LIP over
Totally Real Number Fields and Applications
Nour-eddine Rahmani, Taoufik Serraj, Moulay Chrif
Ismaili Mohammed I University, Oujda, Morocco
09:30 – 10:00PMNS arithmetic for elliptic curve
cryptography
Fangan Yssouf Dosso, Sylvain Duquesne, Nadia EL Mrabet, Emma Gautier
École des Mines de Saint-Étienne, France; University of Rennes, France
10:00 – 10:30Constant-time Integer Arithmetic for SQIsign
Fatna Kouider, David Jacquemin, Anisha Mukherjee, Peter Kutas Eötvös Loránd
University, Hungary; ISEC, Graz University of Technology, Austria; University of Birmingham, United
Kingdom
11:00 – 11:30FPTRU: Optimization of NTRU-Prime and TLS
Performance Assessment
Xiaowen Hu, Hanyu Wei, Hengchuan Zou, Zhichuang Liang, Wenqian Li, Yunlei
Zhao Fudan University, Shanghai, China; State Key Laboratory of Cryptology, Beijing, China
Speaker: Olivier Blazy Affiliation: Professor at École Polytechnique, France Chair: Vincent Rijmen
14:00 – 14:30Simple Power Analysis Attack on SQIsign
Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy Graz
University of Technology, Austria; Eötvös Loránd University, Hungary; University of
Birmingham, England
14:30 – 15:00Correlation power analysis of LESS and CROSS
Maciej Czuprynko, Anisha Mukherjee, Sujoy Sinha Roy ISEC, Graz University of Technology,
Austria
15:00 – 15:30TPL: Power Leakage Model Based on Technology
Library
Sumesh Manjunath, Hoda Alkhzaimi New York University Abu Dhabi, UAE