Conference Program
Conference Proceeding
The proceedings can be accessed
here
.
They will be available for approximately 4 weeks.
November 17 (Mon)
Venue: The University of Osaka, Nakanoshima Center (10th Floor)(Access Map)
| 16:45–18:00 | Registration and Welcome Refreshment |
|---|
November 18 (Tue)
Venue: Grand Cube Osaka (Osaka International Convention Center)
| 08:30–09:00 | Registration |
|---|---|
| 09:00–09:10 | Opening |
| 09:10–10:10 | Invited Talk 1: AGRAWAL SHWETA (IIT Madras, Computer Science and Engineering) Exploring New Frontiers in Cryptography from Brave New Assumptions (Chair: Mehdi Tibouchi) |
| 10:10–10:30 | Break, Poster Session and Industry Exhibition |
| 10:30–11:45 | Technical Session 1 : Advanced Encryption (Chair: Katsuyuki Takashima) 1. Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption Yuto Imura, Keita Emura 2. On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search Takeshi Yoshida, Keita Emura 3. Faster FHEW Bootstrapping with Adaptive Key Update Qi Zhang, Mingqiang Wang, Xiaopeng Cheng 4. Fully Verifiable Ciphertext-Policy Attribute-Based Encryption (Short) Quoc-Bao Ninh, Quang-Phat Cao, Trung-Dung Tran |
| 11:45–11:55 | Memorial photo |
| 11:55–12:10 | 15 mins walk through Nakanoshima district to the lunch site (Nakanoshima Art Museum) |
| 12:10–13:00 | Lunch at Musée KARATO |
| 13:00–13:15 | 15 mins walk back to Grand Cube Osaka |
13:30–14:45 | Technical Session 2 : Symmetric-Key Cryptography(Chair: Serge Vaudenay) 1. Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation Parisa Amiri Eliasi, Silvia Mella, Lejla Batina 2. Computing the restricted algebraic immunity, and application to WPB functions. Luca Bonamino, Pierrick Méaux 3. Impossible Differential Attack on SAND-128 (Short) Nobuyuki Sugio 4. Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs (Online) Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizár |
14:45–15:05 | Break, Poster Session and Industry Exhibition |
15:05–16:05 | Technical Session 3 : Vulnerability Detection I(Chair: Razvan Beuran) 1. WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder Shiva Agarwal, Suvadeep Hajra, Ayantika Chatterjee, Debdeep Mukhopadhyay 2. Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirectional Tree-Structured Embedding Model Congyu Cao, Xiaohan Wang, Shunda Pan, Haipeng Qu, Guohang Pan 3. Attention-based Code Summarization for Multi-label Vulnerability Detection(Online) Mst Maksuda Bilkis Baby, Md. Atabuzzaman, Md Shajalal, Gunnar Stevens |
16:05–17:05 | 30-min stroll to dinner site through Nakanoshima district |
| 16:40–17:55 | Guided Tour at Nihon Mengyo Club (Cotton Industry House) |
| 18:00–20:00 | Dinner at Nihon Mengyo Club |
November 19 (Wed)
Grand Cube Osaka
| 09:00–09:10 | Registration |
|---|---|
| 09:10–10:10 | Invited Talk 2: Surya Nepal – AI in Cybersecurity: A Double-Edged Sword (Chair: Yongdae Kim) |
| 10:10–10:40 | Break, Poster Session and Industry Exhibition |
| 10:40–11:55 | Technical Session 4: Attacks(Chair: Clement Hoffmann) 1. Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ Mario Lins, René Mayrhofer, Michael Roland 2. Synthetic Lateral Movement Data Generation for Azure Cloud: A Hopper-Based Approach Mohammad Mamun, Hadeer Ahmed, Sherif Saad, Anas Mabrouk 3. Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers (Short) Shahar Golan, Daniel Berend, Yochai Twitto, Itamar Zimerman, Amit Cohen, Boris Tsirkin 4. Acoustic Side Channel Attack on Keyboards Based on Typing Patterns(Online) Alireza Taheritajar, Reza Rahaeimehr |
| 11:55–13:30 | Lunch & Poster Session (in Grand Cube Osaka) |
| 13:30–15:05 | Technical Session 5 : Multi-Party Computation(Chair: Koutarou Suzuki) 1. Efficient Fuzzy Labeled PSI from Vector Ring-OLE Dung Bui, Kelong Cong 2. Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions Yoshiaki Honda, Kazumasa Shinagawa 3. webSPDZ: Versatile MPC on the Web Karl Koch, Dragos Rotaru, Thomas Buchsteiner, Christian Rechberger 4. Impossibility of Four-Card AND Protocols with a Single Closed Shuffle Shizuru Iino, Shota Ikeda, Kazumasa Shinagawa, Yang Li, Kazuo Sakiyama, Daiki Miyahara 5. Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes (Short) Maxim Jourenko, Marcus Völker |
| 15:05–15:25 | Break, Poster Session and Industry Exhibition |
| 15:25–16:20 | Technical Session 6: Vulnerability Detection II(Chair: Shingo Yasuda) 1. What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs Stefano Simonetto, Ronan Oostveen, Thijs van Ede, Peter Bosch, Willem Jonker 2. Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text Stefano Simonetto, Ronan Oostveen, Thijs van Ede, Peter Bosch, Willem Jonker 3. Few‑Shot Retrieval‑Augmented LLMs for Anomaly Detection in Network Traffic (Short) Furqan Rustam, Islam Obaidat, Davide Di Monda, Anca Delia Jurcut |
| 16:30–17:00 | 20-min walk to Aqua Liner (Yodoyabashi port) |
| 17:10–18:00 | Aqua Liner River Cruise → Osaka Castle Pier (link) |
| 18:10–18:40 | Walk to Osaka Castle Nishinomaru Garden |
| 19:00–21:00 | Banquet at Osaka Castle Nishinomaru Garden |
November 20 (Thu)
Grand Cube Osaka
| 09:00–10:35 | Technical Session 7: Post-Quantum Cryptography(Chair: Calvin Abou Haidar) 1. Compressed verification for post-quantum signatures with long-term public keys Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith 2. Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt Qingjie Hu, Zhen Liu, Yuchen Cao, Guanju Xiao, Jianhua Wang 3. Strong Designated Verifier Signatures from Isogeny Assumptions Xuan Thanh Khuc, Willy Susilo, Dung Hoang Duong, Yannan Li, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto 4. To extend or not to extend: Agile Masking Instructions for PQC Markus Krausz, Georg Land, Florian Stolz, Jan Richter-Brockmann, Tim Güneysu 5. DiSK: A Deniable Split KEM from The MLWE Problem (Short) Brian Goncalves, Atefeh Mashatan |
|---|---|
| 10:35–10:55 | Break, Poster Session and Industry Exhibition |
| 10:55–12:30 | Technical Session 8 : Cryptographic Protocols & Blockchain 1. Attribute-based Key Exchange with Optimal Efficiency Liqun Chen, Long Meng, Mark Manulis, Yangguang Tian, Yinghui Zhang 2. Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity Hugo Delavenne, Louise Lallemand 3. Decentralized Fair Exchange with Advertising Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini 4. Revisiting Rational Broadcast Protocols Shunya Otomo, Kenji Yasunaga 5. A Key-Update Mechanism for the Space Data Link Security Protocol (Short) Andreas Hülsing, Tanja Lange, Fiona Johanna Weber |
| 12:30–12:45 | Closing |