8:30 | Registration |
8:45 | Opening remarks |
Session I: Multivariate Cryptography, chair: Bo-Yin Yang |
8:50 | On the Differential Security of Multivariate Public Key Cryptosystems |
| Daniel Smith-Tone |
9:25 | On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack |
| Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari |
10:00 | A security analysis of uniformly-layered Rainbow – Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards Post Quantum Paradigm |
| Takanori Yasuda, Kouichi Sakurai |
10:35 | Coffee Break |
Invited Talk I, chair: Johannes Buchmann |
11:15 | Predicting Lattice Reduction: Progress and Pitfalls |
| Phong Nguyen |
12:15 | Lunch in the Garden Cafeteria of the Howard International House |
Session II: Cryptanalysis I, chair: Tanja Lange |
13:45 | Decoding One Out of Many |
| Nicolas Sendrier |
14:20 | An Efficient Attack on All Concrete KKS Proposals |
| Ayoub Otmani, Jean-Pierre Tillich |
14:55 | Full cryptanalysis of the Chen identification protocol |
| Philippe Gaborit, Julien Schrek, Gilles Zémor |
15:30 | Coffee Break |
Session III: Others, chair: Helger Lipmaa |
16:00 | Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies |
| David Jao, Luca De Feo |
16:35 | A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys |
| Lawrence M. Ioannou, Michele Mosca |
17:10 | Meeting of the Steering Committee in the conference room |
18:30 | Dinner in the Dining Room B1 of Howard International House |
Session IV: Code-based Cryptography, chair: Nicolas Sendrier |
8:45 | Statistical decoding of codes over Fq |
| Robert Niebuhr |
9:20 | Monoidic Codes in Cryptography |
| Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki |
9:55 | Simplified high-speed high-distance list decoding for alternant codes |
| Daniel J. Bernstein |
10:30 | Coffee Break |
Invited Talks II, chair: Chen-Mou Cheng |
11:00 | How was Cryptology with Systems of Multivariate Polynomials as Public Keys Conceived |
| Tsutomu Matsumoto |
11:45 | Upper and lower bounds of degree of regularity of HFE and its variants |
| Jintai Ding |
12:15 | Lunch in the Garden Cafeteria of Howard International House |
14:00 | Excursion |
18:30 | Banquet in the Palace Museum |
Session V: New Schemes, chair: Daniel J. Bernstein |
8:45 | XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions |
| Johannes Buchmann, Erik Dahmen, Andreas Hülsing |
9:20 | Wild McEliece Incognito |
| Daniel J. Bernstein, Tanja Lange, Christiane Peters |
9:55 | Efficient Threshold Encryption from Lossy Trapdoor Functions [slides] |
| Xiang Xie, Rui Xue, Rui Zhang |
10:35 | Coffee Break |
Session VI: Cryptanalysis II, chair: Jintai Ding |
11:00 | Roots of Square: Cryptanalysis of Double-Layer Square and Square+ |
| Enrico Thomae and Christopher Wolf |
11:35 | General Fault Attacks on Multivariate Public Key Cryptosystems [slides] |
| Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai |
12:10 | Lunch in the Garden Cafeteria of Howard International House |
Session VII: Implementations, chair: Lim Seongan |
13:40 | Implementation of McEliece based on Quasi-Dyadic Goppa Codes for Embedded Devices |
| Stefan Heyse |
14:15 | High-speed Hardware Implementation of Rainbow Signature on FPGAs [slides] |
| Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen |
Session VIII: Recent Results, chair: TBA |
14:55 | Atom arrays in semiconductors: from quantum computers to quantum encryption |
| Enrico Prati |
15:15 | Hidden Pair of Bijection Signature (Part II) |
| Masahito Gotaishi |
16:25 | Closing remarks |
16:30 | End and Coffee break |
18:30 | Snack attack at the night market |