Conference Program
Conference Proceeding
The proceedings can be accessed here . The password will be provided to participants later.
November 17 (Mon)
Venue: The University of Osaka, Nakanoshima Center (10th Floor)
| 16:45–18:00 | Registration and Welcome Refreshment |
|---|
November 18 (Tue)
Venue: Grand Cube Osaka (Osaka International Convention Center)
| 08:30–09:00 | Registration |
|---|---|
| 09:00–09:10 | Opening |
| 09:10–10:10 | Invited Talk 1: AGRAWAL SHWETA (IIT Madras, Computer Science and Engineering) Exploring New Frontiers in Cryptography from Brave New Assumptions |
| 10:10–10:30 | Break, Poster Session and Industry Exhibition |
| 10:30–11:45 | Technical Session 1 : Advanced Encryption 1. Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption Yuto Imura, Keita Emura 2. On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search Takeshi Yoshida, Keita Emura 3. Faster FHEW Bootstrapping with Adaptive Key Update Qi Zhang, Mingqiang Wang, Xiaopeng Cheng 4. Fully Verifiable Ciphertext-Policy Attribute-Based Encryption (Short) Quoc-Bao Ninh, Quang-Phat Cao, Trung-Dung Tran |
| 11:45–11:55 | Memorial photo |
| 11:55–12:10 | 15 mins walk through Nakanoshima district to the lunch site (Nakanoshima Art Museum) |
| 12:10–13:00 | Lunch at Musée KARATO |
| 13:00–13:15 | 15 mins walk back to Grand Cube Osaka |
| 13:15–14:30 | Technical Session 2 : Symmetric-Key Cryptography 1. Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation Parisa Amiri Eliasi, Silvia Mella, Lejla Batina 2. Computing the restricted algebraic immunity, and application to WPB functions. Luca Bonamino, Pierrick Méaux 3. Impossible Differential Attack on SAND-128 (Short) Nobuyuki Sugio 4. Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs (Online) Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizár |
| 14:30–15:00 | Break, Poster Session and Industry Exhibition |
| 15:00–16:00 | Technical Session 3 : Vulnerability Detection I 9. WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder Shiva Agarwal, Suvadeep Hajra, Ayantika Chatterjee, Debdeep Mukhopadhyay 10. Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirectional Tree-Structured Embedding Model Congyu Cao, Xiaohan Wang, Shunda Pan, Haipeng Qu, Guohang Pan 11. Attention-based Code Summarization for Multi-label Vulnerability Detection(Online) Mst Maksuda Bilkis Baby, Md. Atabuzzaman, Md Shajalal, Gunnar Stevens |
| 16:00–17:05 | 30-min stroll to dinner site through Nakanoshima district |
| 16:40–17:55 | Guided Tour at Nihon Mengyo Club (Cotton Industry House) |
| 18:00–20:00 | Dinner at Nihon Mengyo Club |
November 19 (Wed)
Grand Cube Osaka
| 09:00–09:10 | Registration |
|---|---|
| 09:10–10:10 | Invited Talk 2: Surya Nepal – Cybersecurity and Quantum Systems |
| 10:10–10:40 | Break, Poster Session and Industry Exhibition |
| 10:40–11:55 | Technical Session 4: Attacks 1. Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ Mario Lins, René Mayrhofer, Michael Roland 2. Synthetic Lateral Movement Data Generation for Azure Cloud: A Hopper-Based Approach Mohammad Mamun, Hadeer Ahmed, Sherif Saad, Anas Mabrouk 3. Acoustic Side Channel Attack on Keyboards Based on Typing Patterns Alireza Taheritajar, Reza Rahaeimehr 4. Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers (Short) Shahar Golan, Daniel Berend, Yochai Twitto, Itamar Zimerman, Amit Cohen, Boris Tsirkin |
| 11:55–13:30 | Lunch & Poster Session (in Grand Cube Osaka) |
| 13:30–15:05 | Technical Session 5 : Multi-Party Computation 1. Efficient Fuzzy Labeled PSI from Vector Ring-OLE Dung Bui, Kelong Cong 2. Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions Yoshiaki Honda, Kazumasa Shinagawa 3. webSPDZ: Versatile MPC on the Web Karl Koch, Dragos Rotaru, Thomas Buchsteiner, Christian Rechberger 4. Impossibility of Four-Card AND Protocols with a Single Closed Shuffle Shizuru Iino, Shota Ikeda, Kazumasa Shinagawa, Yang Li, Kazuo Sakiyama, Daiki Miyahara 5. Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes (Short) Maxim Jourenko, Marcus Völker |
| 15:05–15:25 | Break, Poster Session and Industry Exhibition |
| 15:25–16:20 | Technical Session 6: Vulnerability Detection II 1. What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs Stefano Simonetto, Ronan Oostveen, Thijs van Ede, Peter Bosch, Willem Jonker 2. Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text Stefano Simonetto, Ronan Oostveen, Thijs van Ede, Peter Bosch, Willem Jonker 3. Few‑Shot Retrieval‑Augmented LLMs for Anomaly Detection in Network Traffic (Short) Furqan Rustam, Islam Obaidat, Davide Di Monda, Anca Delia Jurcut |
| 16:30–17:00 | 20-min walk to Aqua Liner (Yodoyabashi port) |
| 17:10–18:00 | Aqua Liner River Cruise → Osaka Castle Pier (link) |
| 18:10–18:40 | Walk to Osaka Castle Nishinomaru Garden |
| 19:00–21:00 | Banquet at Osaka Castle Nishinomaru Garden |
November 20 (Thu)
Grand Cube Osaka
| 09:00–10:35 | Technical Session 7: Post-Quantum Cryptography 1. Compressed verification for post-quantum signatures with long-term public keys Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith 2. Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt Qingjie Hu, Zhen Liu, Yuchen Cao, Guanju Xiao, Jianhua Wang 3. Strong Designated Verifier Signatures from Isogeny Assumptions Xuan Thanh Khuc, Willy Susilo, Dung Hoang Duong, Yannan Li, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto 4. To extend or not to extend: Agile Masking Instructions for PQC Markus Krausz, Georg Land, Florian Stolz, Jan Richter-Brockmann, Tim Güneysu 5. DiSK: A Deniable Split KEM from The MLWE Problem (Short) Brian Goncalves, Atefeh Mashatan |
|---|---|
| 10:35–10:55 | Break, Poster Session and Industry Exhibition |
| 10:55–12:30 | Technical Session 8 : Cryptographic Protocols & Blockchain 1. Attribute-based Key Exchange with Optimal Efficiency Liqun Chen, Long Meng, Mark Manulis, Yangguang Tian, Yinghui Zhang 2. Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity Hugo Delavenne, Louise Lallemand 3. Decentralized Fair Exchange with Advertising Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini 4. Revisiting Rational Broadcast Protocols Shunya Otomo, Kenji Yasunaga 5. A Key-Update Mechanism for the Space Data Link Security Protocol (Short) Andreas Hülsing, Tanja Lange, Fiona Johanna Weber |
| 12:30–12:45 | Closing |