Technical Program > Program

Sunday, July 20

20:00 – 22:00Registration at Rent-In Residence Atlas hotel:
https://www.rent-inn.ma

Monday, July 21

Registration

08:00 – 09:00Registration at ENSIAS College

Session 1: Designs (I)

Chair: Pascal Lafourcade

09:00 – 09:30Attribute-based Encryption using Sum-Product Decomposition of Boolean Functions
Arani Raychaudhuri, Ramprasad Sarkar, Mriganka Mandal Indian Statistical Institute Kolkata, India

09:30 – 10:00 Simultaneously simple universal and indifferentiable hashing to elliptic curves
Dimitri Koshelev University of Lleida, Catalonia, Spain

Opening

10:00 – 10:30Opening Ceremony

10:30 – 11:00 Coffee Break

Session 2: Homomorphic Encryption (I)

Chair: Olivier Blazy

11:00 – 11:30One-Way Homomorphic Encryption: A Composite Group Approach
Mahdi Mahdavi, Helena Rifà-Pous Universitat Oberta de Catalunya, Spain; Shahid Beheshti University, Iran

Keynote Talk 1 :  Jeongeun Park

Chair: Vincent Rijmen

Keynote Talk 1 :  Associate Professor at NTNU, Norway

11:30 – 12:30Fully homomorphic encryption; what, why, and how?

12:30 - 14:00
Lunch Break

Session 3: Homomorphic Encryption (II)

Chair: Olivier Blazy

14:00 – 14:30Activate Me!: Designing Efficient Activation Functions for Privacy-PML with Fully Homomorphic Encryption
Nges Brian Njungle, Michel A. Kinsy Arizona State University, USA

Session 4: Cryptanalysis

Chair: Jeongeun Park

14:30 – 15:00Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy Issues in SDSSE-CQ-S and VCDSSE
Bibhas Chandra Das Institute for Advancing Intelligence TCG CREST, India; Chennai Mathematical Institute, India

15:00 – 15:30Efficient and Optimized Modeling of S-Boxes
Anirudh Aitipamula, Debranjan Pal, Dipanwita Roy Chowdhury Indian Institute of Technology Kharagpur, India; Indian Institute of Technology Kanpur, India

15:30 – 16:00Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography
Solane El Hirch, Christine van Vredendaal, Frank Custers Radboud University Nijmegen, The Netherlands; NXP Semiconductors Eindhoven, The Netherlands

16:00 - 16:30
Coffee Break

Session 5: Designs (II)

Chair: Pascal Lafourcade

16:30 – 17:00Bivariate proximity test-based Asynchronous Verifiable Secret Sharing
Lola-Baie Mallordy, Olivier Blazy, Daniel Augot, Hugo Delavenne LIX, Ecole Polytechnique, Institut Polytechnique de Paris, Inria, France

17:00 – 17:30Behemoth: transparent polynomial commitment scheme constant opening proof size and verifier time
Istvan Seres, Péter Burcsi Eötvös Loránd University, Hungary

Tuesday, July 22

Session 6: Cryptanalysis of RSA

Chair: Nadia El Mrabet

09:00 – 09:30A Novel Partial Key Exposure Attack on Common Prime RSA
Mengce Zheng and Abderrahmane Nitaj Zhejiang Wanli University, China; University of Caen Normandie, France

09:30 – 10:00Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve
Mohammed Rahmani and Abderrahmane Nitaj Mohammed First University, Oujda, Morocco; University of Caen Normandie, France

10:00 – 10:30A New Generalized Attack on RSA-like Cryptosystems
Michel SECK, Oumar Niang, Djiby Sow, Abderrahmane Nitaj, Mengce Zheng, Maher Boudabra Ecole Polytechnique de Thies, Senegal; UCAD Dakar, Senegal; University of Caen Normandie, France; Zhejiang Wanli University Ningbo, China; KFUPM Dhahran, Saudi Arabia

10:30 - 11:00
Coffee Break

Session 7: Homomorphic Encryption (III)

Chair: Olivier Blazy

11:00 – 11:30 Convolution-Friendly Image Compression with FHE
Georgio Nicolas, Sergi Rovira, Axel Mertens COSIC, KU Leuven, Belgium; Technology Innovation Institute, UAE

11:30 – 12:00 Leveled Homomorphic Encryption over Composite Groups
Mahdi Mahdavi, Ehsan Meamari, Emad Heydari Beni, Maryam Sheikhi Universitat Oberta de Catalunya, Spain; University of Delaware, USA; COSIC, KU Leuven, Belgium & Nokia Bell Labs; University of Hamburg, Germany

Keynote Talk 2 :  Pascal Lafourcade

Chair: Tako Boris Fouotsa

Keynote Talk 2 :  Professor of Computer Science at IUT of Clermont Auvergne, France

12:00 – 13:00A Proof of Behavior

13:00 - 14:30
Lunch Break

15:00 – 19:00 Guided visit of Rabat

20:00 – --:-- Gala dinner

Wednesday, July 23

Session 8: Cryptography Arithmetic (I)

Chair: Abderrahmane Nitaj

09:00 – 09:30An Improvement of the Congruence Solver of LIP over Totally Real Number Fields and Applications
Nour-eddine Rahmani, Taoufik Serraj, Moulay Chrif Ismaili Mohammed I University, Oujda, Morocco

09:30 – 10:00PMNS arithmetic for elliptic curve cryptography
Fangan Yssouf Dosso, Sylvain Duquesne, Nadia EL Mrabet, Emma Gautier École des Mines de Saint-Étienne, France; University of Rennes, France

10:00 – 10:30Constant-time Integer Arithmetic for SQIsign
Fatna Kouider, David Jacquemin, Anisha Mukherjee, Peter Kutas Eötvös Loránd University, Hungary; ISEC, Graz University of Technology, Austria; University of Birmingham, United Kingdom

10:30 - 11:00
Coffee Break

Session 9: Cryptography Arithmetic (II)

Chair: Abderrahmane Nitaj

11:00 – 11:30FPTRU: Optimization of NTRU-Prime and TLS Performance Assessment
Xiaowen Hu, Hanyu Wei, Hengchuan Zou, Zhichuang Liang, Wenqian Li, Yunlei Zhao Fudan University, Shanghai, China; State Key Laboratory of Cryptology, Beijing, China

Keynote Talk 3 :  Olivier Blazy

Chair: Vincent Rijmen

Keynote Talk 3 :  Professor at École Polytechnique, France

11:30 – 12:30HQC and the Future of Code-Based Cryptography: From Foundations to Hybridization

12:30 - 14:00
Lunch Break

Session 10: Side-channel Attacks

Chair: Said Eddahmani

14:00 – 14:30Simple Power Analysis Attack on SQIsign
Anisha Mukherjee, Maciej Czuprynko, David Jacquemin, Péter Kutas, Sujoy Sinha Roy Graz University of Technology, Austria; Eötvös Loránd University, Hungary; University of Birmingham, England

14:30 – 15:00Correlation power analysis of LESS and CROSS
Maciej Czuprynko, Anisha Mukherjee, Sujoy Sinha Roy ISEC, Graz University of Technology, Austria

15:00 – 15:30TPL: Power Leakage Model Based on Technology Library
Sumesh Manjunath, Hoda Alkhzaimi New York University Abu Dhabi, UAE

15:30 – 16:00Concluding Remarks

16:00 - 16:30
Coffee Break
Loading... Loading...