Days: Wednesday, July 5th Thursday, July 6th Friday, July 7th
View this program: with abstractssession overviewtalk overview
Attendees to check in at the registration desk.
Introduction to venue, overview of event, and welcome to country.
Associate Professor Lennon Chang from Deakin University.
Morning Tea.
Session topic: Symmetric Cryptography (4 papers).
10:50 | A New Correlation Cube Attack Based on Division Property (abstract) PRESENTER: Cheng Che |
11:15 | Key Recovery Attacks on Grain-like Keystream Generators with Key Injection (abstract) PRESENTER: Harry Bartlett |
11:40 | Related-Cipher Attacks: Applications to Ballet and ANT (abstract) PRESENTER: Yafei Zheng |
12:05 | The Triangle Differential Cryptanalysis (abstract) PRESENTER: Xiaofeng Xie |
Lunch Time.
Session topic: Symmetric Cryptography (3 papers).
13:30 | Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure (abstract) |
13:55 | Exploring Formal Methods for Cryptographic Hash Function Implementations (abstract) |
14:20 | Cryptanalysis of SPEEDY (abstract) PRESENTER: Jinliang Wang |
Afternoon Tea.
Mr. Adrian Cansdell from Australian Signals Directorate (ASD).
Session topic: System Security (2 papers).
16:05 | BinAlign: Alignment Padding based Compiler Provenance Recovery (abstract) PRESENTER: Debin Gao |
16:30 | Encrypted Network Traffic Classification with Higher Order Graph Neural Network (abstract) PRESENTER: Zulu Okonkwo |
Day-1 summary and directions to Conference Dinner venue.
View this program: with abstractssession overviewtalk overview
Late check in for newly arrived attendees.
Session topic: Symmetric Cryptography (2 papers).
09:00 | Improved Differential Cryptanalysis on SPECK Using Plaintext Structures (abstract) PRESENTER: Ye Luo |
09:25 | Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers (abstract) PRESENTER: Zeyu Xu |
ACISP-2023 Conference photo (all participants to attend).
Morning Tea.
Ms. Leanne Harvey and Mr. Jack Cross from Queensland University of Technology (QUT).
Session topic: Identity-based Cryptography (4 papers).
11:30 | Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors (abstract) PRESENTER: Jingjing Fan |
11:55 | Identity-based encryption from lattices using approximate trapdoors (abstract) PRESENTER: Lucas Prabel |
12:20 | Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model (abstract) PRESENTER: Qinyi Li |
12:45 | A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM (abstract) PRESENTER: Jia-Chng Loh |
Lunch Time.
Session topic: Post-quantum Cryptography (4 papers).
14:10 | Quantum Algorithm for Finding Impossible Differentials and Zero-correlation Linear Hulls of Symmetric Ciphers (abstract) PRESENTER: Huiqin Chen |
14:35 | Memory-Efficient Quantum Information Set Decoding Algorithm (abstract) PRESENTER: Atsushi Takayasu |
15:00 | Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security (abstract) PRESENTER: Rentaro Shiba |
15:25 | Quantum-access Security of Hash-based Signature Schemes (abstract) PRESENTER: Quan Yuan |
Afternoon Tea.
Session topic: Recognition of Emeritus Professor Edward Dawson.
View this program: with abstractssession overviewtalk overview
Late check in for newly arrived attendees.
ACISP Steering Committee meeting (review of 2023 process and event, and planning for 2024).
Professor Helge Janicke from Cyber Security Cooperative Research Centre (CSCRC).
Morning Tea.
Session topic: Asymmetric Cryptography (4 papers).
11:20 | Compact Password Authenticated Key Exchange from Group Actions (abstract) PRESENTER: Kazuki Yoneyama |
11:45 | Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications (abstract) PRESENTER: Masahito Ishizaka |
12:10 | Reusable, Instant and Private Payment Guarantees for Cryptocurrencies (abstract) PRESENTER: Akash Madhusudan |
12:35 | Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE (abstract) PRESENTER: Peiying Xu |
Lunch Time.
Session topic: Cryptographic Protocols (4 papers).
14:00 | CSI-SharK: CSI-FiSh with Sharing-friendly Keys (abstract) PRESENTER: Shahla Atapoor |
14:25 | Modular Design of KEM-Based Authenticated Key Exchange (abstract) PRESENTER: Bor de Kock |
14:50 | Practical Verifiable Random Function with RKA Security (abstract) PRESENTER: Tsz Hon Yuen |
15:15 | Statistically Consistent Broadcast Authenticated Encryption with Keyword Search: Adaptive Security from Standard Assumptions (abstract) |
Final Afternoon Tea and GoodBye!