Time | Activity / Topic |
---|---|
09:00 - 10.00 | Registration |
Session 1: Tutorial 1 Chair: A Suganya, SETS |
|
10:00 - 11.30 | Part 1 Hero in the shadows: Cryptographic Boolean Functions Pantelimon Stănică Naval Postgraduate School |
11.30 - 12.00 | Tea Break |
12.00 - 13.00 | Part 2: Hero in the shadows: Cryptographic Boolean Functions Pantelimon Stănică Naval Postgraduate School |
13:00 - 14.00 | Lunch |
Session 2: Tutorial 2 Chair: Santanu Sarkar, IIT Madras |
|
14.00 - 15.30 |
Part 1: Quantum Algorithms for Analysis of Cryptographically Significant Boolean Functions Subhamoy Maitra Indian Statistical Institute |
15.30 - 16.00 | Tea Break |
16.00 - 17.00 |
Part 2: Quantum Algorithms for Analysis of Cryptographically Significant Boolean Functions Subhamoy Maitra Indian Statistical Institute |
Time | Activity / Topic |
---|---|
08.00 – 09.00 | Registration |
09.00 – 10.45 | Inauguration (Click here to view the Inaugural session details) |
10.45 – 11.00 | Tea Break/ Product Exhibition (Visit to stalls) |
Session 3: Invited Talk I Chair: Madhavan Mukund, CMI |
|
11.00 – 12.00 | Challenges in Symmetric-Key Cryptography Vincent Rijmen KU Leuven Download Slides |
Session 4: Contributed Talks – Symmetric-Key Cryptography-1 Chair : Dipanwita Roy Chowdhury, IIT Kharagpur |
|
12.00 – 12.30 | ChakraYuha - a Fast Self Synchronizing Stream Cipher Rajeeva Karandikar Download Slides |
12.30 – 13.00 | UFLM: A unified framework for Feistel structure and Lai-Massey structure Zhengyi Dai, Chun Guo and Chao Li Download Slides |
13.00 – 14.00 | Lunch / Product Exhibition (Visit to stalls) |
Session 5 - Contributed Talks – Post-Quantum Cryptography -I Chair: Bimal Roy, ISI |
|
14.00 - 14.30 | Isogeny interpolation and the computation of isogenies from higher dimensional representations David Jao and Jeanne Laflamme Download Slides |
14.30 - 15.00 | CPAKE: An Identity-binding Password Authenticated Key Exchange from Quasi-Cyclic Codes Pratima Jana and Ratna Dutta |
15.00 - 15.30 | Enhanced Bound for the Commutative Isogeny Hidden Number Problem in CSURF Santanu Sarkar |
15.30 - 16.00 | Post-Quantum DNSSEC with Faster TCP Fallbacks Aditya Singh Rawat and Mahabir Prasad Jhanwar Download Slides |
16.00 – 16.30 | Tea Break / Product Exhibition (Visit to stalls) |
Session 6 - Contributed Talks – Cryptanalysis-I Chair: Sanjit Chatterjee, IISc |
|
16.30 - 17.00 | OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion Trevor Yap, Stjepan Picek and Shivam Bhasin |
17.00 - 17.30 | On Improved Cryptanalytic Results against ChaCha for Reduced Rounds ≥ 7 Nitin Kumar Sharma, Sabyasachi Dey, Santanu Sarkar and Subhamoy Maitra Download Slides |
17.30 - 18.00 | Differential Fault Attack on ASCON Cipher Amit Jana |
18.00 - 18.30 | An Improved Differential Fault Attack on the Stream Cipher Espresso Debendranath Das, Anirban Ghatak, Indivar Gupta, Sabyasachi Karati and Arindam Mandal |
18.30 - 19.00 | CRSI Meeting |
18.45 Onwards | Cultural program followed by dinner |
Time | Activity / Topic |
---|---|
Session 7 - Invited Talk 2 Chair: Dr Debasish Roy IPS, DG & IGP Railways, West Bengal |
|
9.00 – 10.00 | SQIsign: past, present and future Luca De Feo IBM Research Europe Download Slides |
Session 8 - Contributed Talks – Cryptographic Constructions - I Chair: Tapas Pandit, Plaksha University |
|
10.00 – 10.30 | Multi-Key Fully- Homomorphic Aggregate MAC for Arithmetic Circuits Suvasree Biswas and Arkady Yerukhimovich Download Slides |
10.30 – 11.00 | Leakage-Resilient Key-Dependent Message Secure Encryption Schemes Dhairya Gupta, Mahesh Rajasree and Harihar Swaminathan Download Slides |
11.00 - 11.30 | Tea Break/ Product Exhibition (Visit to stalls) |
Session 9 - Contributed Talks – Symmetric-Key Cryptography-II Chair: Indivar Gupta, SAG, DRDO |
|
11.30 – 12.00 | ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya and Takanori Isobe |
12.00 – 12.30 | Proving the Security of the Extended Summation-Truncation Hybrid Avijit Dutta and Eik List |
12.30 – 13.00 | Constructing WAPB Boolean Functions from the Direct Sum of WAPB Boolean Functions Deepak Kumar Dalai and Krishna Mallick Download Slides |
13.00 – 14.00 | Lunch/ Product Exhibition (Visit to stalls) |
Session 10 - Contributed Talks – Foundation |
|
14.00 - 14.30 | Improving Tightness Gap of GGM Construction Mridul Nandi |
14.30 - 15.00 | An Efficient Noncommutative NTRU from Semidirect
Product Vikas Kumar, Ali Raya, Aditi Kar Gangopadhyay, Sugata Gangopadhyay and Md Tarique Hussain Download Slides |
15.00 – 15.30 | On Approx-SVP in multiquadratic ideal lattices Semyon Novoselov Download Slides |
15.30 – 16.00 | Secure and Efficient Outsourced Matrix Multiplication
with Homomorphic Encryption Aikata Aikata and Sujoy Sinha Roy Download Slides |
16.00 – 16.15 | Tea Break/ Product Exhibition (Visit to stalls) |
16.15 – 18:20 | 1. Session on Collaborative Innovation (Click here to view the industry session details) 2. Industry Talks: Odyssey, Thales/Exclusive Networks, BEL, Elmack Engineering Services, Payatu, Zoho, SkillsDA, Matrix and Prama |
19.30 Onwards | Banquet Dinner |
Time | Activity / Topic |
---|---|
Session 11 - Invited Talk 3: Chair: V Mary Anita Rajam, Anna University |
|
9.00 – 10.00 | Logic-Based Verification and Testing for Cryptographic Protocol Design and Implementation Lucca Hirschi Inria Download Slides |
Session 12 - Contributed Talks – Blockchain and Cloud Computing Chair: Reshmi TR, SETS |
|
10.00- 10.30 | Secure Vault scheme in the Cloud Operating Model Rishiraj Bhattacharyya, Avradip Mandal and Meghna Sengupta Download Slides |
10.30- 11.00 | Blockchain-Enabled Distributed Rummy: Proof for the Designers in Online Skill Gaming Industries Debendranath Das and Shubhamoy Maitra Download Slides |
11.00 - 11.30 | Tea Break/ Product Exhibition (Visit to stalls) |
Session 13 - Contributed Talks – Cryptographic Constructions- II Chair: Ratna Dutta, IIT Kharagpur |
|
11.30 – 12.00 | An Efficient Toolkit for Computing Third-party Private Set Intersection Kai Chen, Yongqiang Li, and Mingsheng Wang Download Slides |
12.00 – 12.30 | Revisiting Generic Conversion from Non-Adaptive to Adaptively Secure IBS: Tightness and an Extension Sanjit Chatterjee and Tapas Pandit Download Slides |
12.30 – 13.00 | Efficient Revocable Linkable Ring Signatures R Kabaleeshwaran and Bachala Khandava Kishan Download Slides |
13.00 – 14.00 | Lunch/ Product Exhibition (Visit to stalls) |
Session 14 - Contributed Talks Post-Quantum Cryptography II and Quantum Cryptography Chair: Bhupendra Singh, CAIR |
|
14.00 - 14.30 | Polynomial Inversion Algorithms in Constant Time for Post-Quantum Cryptography Abhraneel Dutta, Emrah Karagoz, Edoardo Persichetti and Pakize Sanal Download Slides |
14.30 - 15.00 | A Novel PQ-KEM based on Coding Theory Ekta Bindal, Abhay Kumar Singh, and Manoj Kumar Singh |
15.00 - 15.30 | Quantum Cryptanalysis of ZUC and Related Resource Estimation Suman Dutta, Anirban Ghatak, Anupam Chattopadhyay and Subhamoy Maitra Download Slides |
15.30 - 16.00 | A Parametric Class of Mutually Unbiased Bases using Resolvable Block Designs Ajeet Kumar, Rakesh Kumar, and Subhamoy Maitra Download Slides |
16.00-16.30 | Tea Break/ Product Exhibition (Visit to stalls) |
Session 15 - Contributed Talks – Cryptanalysis-II Chair: R Bhaskaran, Anna University |
|
16.30 - 17.00 | CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher Emanuele Bellini, Mattia Formenti, David Gerault, Juan del Carmen Grados Vasquez, Anna Hambitzer, Yun Ju Huang, Paul Huynh, Mohamed Rachidi, Raghvendra Rohit and Sharwan Kumar Tiwari |
17.00 - 17.30 | Deep Learning-Based Differential Distinguishers for Cryptographic Sequences Amrita Bose, Debranjan Pal and Dipanwita Roy Chowdhury Download Slides |
17.30 - 18.00 | BIZness: Bit Invariant Zero-Sum Property based on Division Trail Shibam Ghosh, Anup Kumar Kundu, Mostafizar Rahman and Dhiman Saha Download Slides |
18.00 - 18.30 | Closing Remarks |