Invited Speakers
- Roberto Avanzi (ARM Germany GmbH), “Aspects of the Design of QARMAv2”
- Subhadeep Banik (University of Lugano, Switzerland), “Compact Circuits for Efficient Möbius Transform”
- Ritam Bhaumik (EPFL, Switzerland), “A new proof framework for post-quantum security of symmetric-key schemes”
- Christina Boura (Université Versailles Saint-Quentin-en-Yvelines, Université Paris-Saclay, France), “Automating the key recovery in differential attacks: A new algorithm and tool”
- Wonseok Choi (Purdue University, USA), “Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs”
- Patrick Derbez (University of Rennes, France), “Differential Meet-in-the-middle attacks and Models”
- Avijit Dutta (Institute for Advancing Intelligence, TCG CREST, India), “Cascading Four Round LRW1 is Beyond Birthday Bound Secure”
- Zheng Gong (South China Normal University, China), “Unboxing ARX-based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications”
- Juan Grados and Mohamed Rachidi (Technology Innovation Institute, United Arab Emirate), “CLAASP: a Cryptographic Library for the Automated Analysis of Symmetric Primitives”
- Lorenzo Grassi (Ruhr University Bochum, Germany), “Horst and Amaryllises: Possible Generalizations of the Feistel and of the Lai-Massey Schemes”
- Jian Guo (Nanyang Technological University, Singapore), “A realistic summary and projection of cryptanalysis”
- Mustafa Khairallah (Seagate Research Group, Singapore), “Cryptanalysis of TNT: A New Chapter in the LRW Paradigm”
- Fukang Liu (Tokyo Institute of Technology, Japan), “Coefficient Grouping: A New Efficient Technique to Evaluate the Algebraic Degree of SPN Ciphers over F_{2^n}”
- Loic Masure (Université de Montpellier, France), “masking implementations of symmetric crypto in a low noise environment : analysis and evaluation”
- Siwei Sun (University of Chinese Academy of Sciences, China), “Speeding Up Preimage and Key-Recovery Attacks with Differential-Linear Approximations”
- Weijia Wang (Shandong University, China), “Efficient Higher-Order Masking Schemes: Leveraging Amortization and Pre-computation”
- Bin Zhang (Institute of Software, Chinese Academy of Science, China), “Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher”