Schedule
8:45 AM – 9:00 AM
Salle Polyvalente (SH-4800)
SAC Summer School - Welcome
9:00 AM – 10:30 AM
Salle Polyvalente (SH-4800)
SAC Summer School - Quantum cryptography, Part 1
A tutorial on quantum cryptography
Anne Broadbent, University of Ottawa, Canada
10:30 AM – 11:00 AM
Coffee Break
11:00 AM – 12:15 PM
Salle Polyvalente (SH-4800)
SAC Summer School - Quantum cryptography, Part 2
A tutorial on quantum cryptography
Anne Broadbent, University of Ottawa, Canada
12:15 PM – 1:45 PM
Salle Polyvalente (SH-4800)
Lunch (included on site)
1:45 PM – 3:15 PM
Salle Polyvalente (SH-4800)
SAC Summer School - Cryptographic formalization and the law, Part 1
A tutorial on cryptographic formalization and the law
Aloni Cohen, University of Chicago, USA
3:415 PM – 3:45 PM
Coffee Break
3:45 PM – 5:00 PM
Salle Polyvalente (SH-4800)
SAC Summer School - Cryptographic formalization and the law, Part 2
A tutorial on cryptographic formalization and the law
Aloni Cohen, University of Chicago, USA
9:00 AM – 10:30 AM
Salle Polyvalente (SH-4800)
SAC Summer School - Local differential privacy, Part 1
A tutorial on local differential privacy
Héber Arcolezi, Inria, France
10:30 AM – 11:00 AM
Coffee Break
11:00 AM – 12:15 PM
Salle Polyvalente (SH-4800)
SAC Summer School - Local differential privacy, Part 2
A tutorial on local differential privacy
Héber Arcolezi, Inria, France
12:15 PM – 1:15 PM
Salle Polyvalente (SH-4800)
Lunch (included on site)
1:45 PM – 3:15 PM
Salle Polyvalente (SH-4800)
SAC Summer School - Usability and cryptography, Part 1
A tutorial on usability and cryptography
Bailey Kacsmar, University of Alberta, Canada
3:15 PM – 3:45 PM
Coffee Break
3:45 PM – 5:00 PM
Salle Polyvalente (SH-4800)
SAC Summer School - Usability and cryptography, Part 2
Bailey Kacsmar, University of Alberta, Canada
8:30 AM – 9:05 AM
Salle Polyvalente (SH-4800)
Registration
Pick up your badge
9:05 AM – 9:15 AM
Salle Polyvalente (SH-4800)
Opening Remarks
by Sébastien Gambs and Maria Eichlseder
9:15 AM – 10:15 AM
Salle Polyvalente (SH-4800)
Invited Lecture - Online Age Verification, and Privacy Protection: An impossible Equation?
Olivier Blazy, École Polytechnique, France
10:15 AM – 10:45 AM
Coffee Break
10:45 AM – 12:00 PM
Salle Polyvalente (SH-4800)
Post-quantum cryptography
BUFFing FALCON without Increasing the Signature Size
by Samed Düzlü, Rune Fiedler and Marc Fischlin
• pre-proceeding version (PDF)
• slides
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks
by Max Duparc, Tako Boris Fouotsa and Serge Vaudenay
• pre-proceeding version (PDF)
• slides
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Smooth Twins and their Isogeny-based Applications
by Bruno Sterner
• pre-proceeding version (PDF)
• slides
12:00 PM – 1:30 PM
Lunch Break
(not included)
1:30 PM – 2:20 PM
Salle Polyvalente (SH-4800)
Symmetric primitive design
Koala: A Low-Latency Pseudorandom Function
by Yanis Belkheyar, Parisa Amiri Eliasi, Joan Daemen, Santosh Ghosh, Daniël Kuijsters, Alireza Mehrdad, Silvia Mella, Shahram Rasoolzadeh and Gilles Van Assche
• pre-proceeding version (PDF)
• slides
Minimize the Randomness in Rasta-Like Designs: How Far Can We Go? Application to PASTA
by Lorenzo Grassi, Fukang Liu, Christian Rechberger, Fabian Schmid, Roman Walch and Qingju Wang
• pre-proceeding version (PDF)
• slides
2:20 PM – 3:10 PM
Salle Polyvalente (SH-4800)
Symmetric cryptanalysis
A Univariate Attack against the Limited-Data Instance of Ciminion
by Augustin Bariant
• pre-proceeding version (PDF)
• slides
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity
by Xingwei Ren, Yongqiang Li and Mingsheng Wang
• pre-proceeding version (PDF)
• slides
3:10 PM – 3:40 PM
Coffee Break
3:40 PM – 4:55 PM
Salle Polyvalente (SH-4800)
Privacy-preserving cryptography I
Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification
by Kelong Cong, Robin Geelen, Jiayi Kang and Jeongeun Park
• pre-proceeding version (PDF)
• slides
Simulation Secure Multi-Input Quadratic Functional Encryption
by Ferran Alborch Escobar, Sébastien Canard and Fabien Laguillaumie
• pre-proceeding version (PDF)
• slides
Generation of Authenticated Secret-Shared Scaled Unit Vectors for Beaver Triples
by Vincent Rieder
• pre-proceeding version (PDF)
• slides
6:00 - 9:00 PM
Espace St-Denis, salle Marie-Louise
Reception
9:25 AM – 10:15 AM
Salle Polyvalente (SH-4800)
Privacy-preserving cryptography II
Multi-Key Homomorphic Encryption with Threshold Re-Encryption
by Akira Nakashima, Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Kengo Mori and Toshiyuki Isshiki
• pre-proceeding version (PDF)
• slides
Multi-User Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives
by Takato Hirano, Yutaka Kawai, Yoshihiro Koseki, Satoshi Yasuda, Yohei Watanabe, Takumi Amada, Mitsugu Iwamoto and Kazuo Ohta
• pre-proceeding version (PDF)
• slides
10:15 AM – 10:45 AM
Coffee Break
10:45 AM – 12:00 PM
Salle Polyvalente (SH-4800)
Public-key cryptanalysis
Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA
by Shunsuke Osaki and Noboru Kunihiro
• pre-proceeding version (PDF)
• slides
Multivariate Blind Signatures Revisited
by Ward Beullens
• pre-proceeding version (PDF)
• slides
Post-Quantum Backdoor for Kyber-KEM
by Wenwen Xia, Geng Wang and Dawu Gu
• pre-proceeding version (PDF)
• slides
12:00 PM – 1:30 PM
Lunch Break
(not included)
1:30 PM – 2:20 PM
Salle Polyvalente (SH-4800)
Identity-based encryption
Identity-Based Encryption from Lattices with More Compactness in the Standard Model
by Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang and Dawu Gu
• pre-proceeding version (PDF)
• slides
Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC)
by Katerina Mitrokotsa, Sayantan Mukherjee and Jenit Tomy
• pre-proceeding version (PDF)
• slides
2:20 PM – 3:10 PM
Salle Polyvalente (SH-4800)
Implementations and Side-channel analysis
Modular Multiplication in the AMNS representation : Hardware Implementation
by Louis Noyez, Nadia El Mrabet, Olivier Potin and Pascal Veron
• pre-proceeding version (PDF)
• slides
Train Wisely: Multifidelity Bayesian Optimization Hyperparameter Tuning in Deep Learning-based Side-Channel Analysis
by Trevor Hong Eng Yap, Shivam Bhasin and Léo Weissbart
• pre-proceeding version (PDF)
• slides
3:10 PM – 3:40 PM
Coffee Break
3:40 PM – 4:55 PM
Salle Polyvalente (SH-4800)
Symmetric design paradigms
Classical and Quantum Generic Attacks on 6-round Feistel Schemes
by Maya Chartouny, Benoît Cogliati and Jacques Patarin
• pre-proceeding version (PDF)
• slides
Weightwise (almost) perfectly balanced functions based on total orders
by Pierrick Méaux
• pre-proceeding version (PDF)
• slides
Generalized Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite Fields
by Arnab Roy and Matthias Johann Steiner
• pre-proceeding version (PDF)
• slides
7:00 PM – 10:00 PM
ITHQ, salle Mont-Royal
Banquet
9:15 AM – 10:15 AM
Salle Polyvalente (SH-4800)
Stafford Tavares Invited Lecture - Relativistic Zero-Knowledge Proofs
Claude Crépeau, McGill University, Canada
10:15 AM – 10:45 AM
Coffee Break
10:45 AM – 12:00 PM
Salle Polyvalente (SH-4800)
Authenticated encryption
Generic Security of the Ascon Mode: On the Power of Key Blinding
by Charlotte Lefevre and Bart Mennink
• pre-proceeding version (PDF)
• slides
Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV
by Mustafa Khairallah
• pre-proceeding version (PDF)
• slides
Provably Secure Online Authenticated Encryption and Bidirectional Online Channels
by Arghya Bhattacharjee, Ritam Bhaumik, Daniel Collins, and Mridul Nandi
• pre-proceeding version (PDF)
• slides