Day 1 - October 6

5
All times in local Colombian time (GMT -5) Day 1 - October 6 7h45: OPENING REMARKS 8h00 -9h30: QUANTUM ALGORITHMS MODERATOR: André Schrottenloher 8h00: Tight Bounds for Simon's Algorithm Xavier Bonnetain 8h20: Constructions for Quantum Indistinguishability Obfuscation Raza Ali Kazmi; Anne Broadbent 8h40: On Forging SPHINCS + -Haraka Signatures on a Fault-tolerant Quantum Computer Robin Berger; Marcel Tiepelt 9h00: Questions and Answers Xavier Bonnetain, Anne Broadbent, Robin Berger. 9h30- 10h00: BREAK 10h00 -11h00: INVITED TALK MODERATOR: Patrick Longa Luca De Feo, ¿What's next for isogeny based cryptography? 11h00- 11h30: BREAK 11h30 -13h30: POST-QUANTUM CRYPTOGRAPHY MODERATOR: Craig Costello 11h30: Post-Quantum Key-Blinding for Authentication in Anonymity Networks Edward Eaton; Douglas Stebila; Roy Stracovsky

Transcript of Day 1 - October 6

All times in local Colombian time (GMT -5)

Day 1 - October 6

7h45: OPENING REMARKS

8h00 -9h30: QUANTUM ALGORITHMS

MODERATOR: André Schrottenloher 8h00: Tight Bounds for Simon's Algorithm Xavier Bonnetain 8h20: Constructions for Quantum Indistinguishability ObfuscationRaza Ali Kazmi; Anne Broadbent

8h40: On Forging SPHINCS + -Haraka Signatures on a Fault-tolerant Quantum ComputerRobin Berger; Marcel Tiepelt

9h00: Questions and AnswersXavier Bonnetain, Anne Broadbent, Robin Berger.

9h30- 10h00: BREAK

10h00 -11h00: INVITED TALK

MODERATOR: Patrick Longa Luca De Feo, ¿What's next for isogeny based cryptography?

11h00- 11h30: BREAK

11h30 -13h30: POST-QUANTUM CRYPTOGRAPHY

MODERATOR: Craig Costello 11h30: Post-Quantum Key-Blinding for Authentication in Anonymity NetworksEdward Eaton; Douglas Stebila; Roy Stracovsky

All times in local Colombian time (GMT -5)

11h50: Implementing and measuring KEMTLSSofía Celi; Armando Faz-Hernández; Nick Sullivan; Goutam Tamvada; Luke Valenta; Thom Wiggers; Bas Westerbaan; Christopher Wood

12h10: A Monolithic Hardware Implementation of Kyber: Comparing Apples to Apples in PQC Candidates Mojtaba Bisheh-Niasar; Reza Azarderakhsh; Mehran Mozaffari-Kermani 12h30: Attribute-Based Access Control for Inner Product Functional Encryption from LWETapas Pal; Ratna Dutta

12h50: Questions and AnswersRoy Stracovsky, Sofía Celi, Mojtaba Bisheh-Niasar, Tapas Pal

Day 2 - October 7

7h30 -9h30: CRYPTANALYSIS AND SIDE-CHANNEL ANALYSIS I

MODERATOR: Orr Dunkelman 7h30: Classical Attacks on a Variant of the RSA CryptosystemAbderrahmane Nitaj; Muhammad Rezal Bin Kamel Ariffin; Nurul Nur Hanisah Adenan; Nur Azman Abu 7h50: Improved attacks against key reuse in learning with errors key exchangeNina Bindel; Douglas Stebila; Shannon Veitch 8h10: Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential CryptanalysisTarun Yadav; Manoj Kumar 8h30: Train or Adapt a Deeply Learned ProfileChristophe Genevey-Metat; Annelie Heuser; Benoit Gérard

8h50: Questions and AnswersAbderrahmane Nitaj, Shannon Veitch, Tarun Yadav, Manoj Kumar, Christophe Genevey-Metat

9h30- 10h00: BREAK

11h30 -13h00: CRYPTANALYSIS AND SIDE-CHANNEL II

MODERATOR: Pooya Farshim

11h30: Autocorrelations of vectorial Boolean functionsAnne Canteaut; Lukas Kölsch; Chao Li; Chunlei Li; Kangquan Li; Longjiang Qu; Friedrich Wiemer 11h50: Automatic Search for Bit-based Division PropertyShibam Ghosh; Orr Dunkelman 12h10: Highly Secure Leakage-resilient TBC-based Authenticated EncryptionEik List

12h30: Questions and AnswersChunlei Li, Shibam Ghosh, Eik List

All times in local Colombian time (GMT -5)

14h00- 15h30: Virtual tour to a traditional Colombian Coffee farm

Day 3 - October 8

6h00- 7h00: Waking up in the Colombian Coffee Region

7h00 -8h30: DISTRIBUTED CRYPTOGRAPHIC PROTOCOLS I

MODERATOR: Nicolas Thériault 7h00: Weight-Based Nakamoto-Style BlockchainsSimon Holmgaard Kamp; Bernardo Magri; Christian Matt; Jesper Buus Nielsen; Søren Eller Thomsen; Daniel Tschudi 7h20: LOVE a PairingDiego F. Aranha; Elena Pagnin; Francisco Rodríguez-Henríquez

10h00 -11h00: INVITED TALK

MODERATOR: Nina Bindel

Shweta Agrawal, Recent Progress and Challenges in Lattice Based Cryptography

11h30- 11h30: BREAK

10h00 -11h00: INVITED TALK

MODERATOR: Carla Ràfols

Dan Boneh, Recent Developments in Cryptography

11h00 - 11h30: BREAK

8h30 - 9h00: BREAK

9h00 -10h00: DISTRIBUTED CRYPTOGRAPHIC PROTOCOLS II

MODERATOR: Javier Herranz

9h00: Stronger Notions and a More Efficient Construction of Threshold Ring SignaturesAlexander Munch-Hansen; Claudio Orlandi; Sophia Yakoubov

9h20: Improved Threshold Signatures, Proactive Secret Sharing and Input Certification from LSS IsomorphismsDiego Aranha; Anders Dalskov; Daniel Escudero; Claudio Orlandi

9h40: Questions and AnswersAlexander Munch-Hansen, Anders Dalskov

7h40: Implementing Secure Reporting of Sexual Misconduct - Revisiting WhoTooAlejandro Hevia; Ilana Mergudich-Thal

8h10: Questions and AnswersSøren Eller Thomsen, Elena Pagnin, Ilana Mergudich-Thal

11h30 - 13h00: MULTIPARTY COMPUTATION

MODERATOR: Alejandro Hevia

11h30: Full-Threshold Actively-Secure Multiparty Arithmetic Circuit GarblingEleftheria Makri; Tim Wood

11h50: The Cost of IEEE Arithmetic in Secure ComputationDavid Archer; Shahla Atapoor; Nigel P. Smart

12h10: Honest Majority MPC with Abort with Minimal Online CommunicationAnders Dalskov; Daniel Escudero

12h30: Questions and AnswersEleftheria Makri, Shahla Atapoor, Daniel Escudero

School of Engineering, Science and Technology Applied Mathematics and

Computer Science

Organized by:

In cooperation with: Sponsor:

13h00 - 13h15: CLOSING REMARKS