Program

You can download the program in pdf format from here.

 

Monday November 2nd

 

9h30
10h30
Chair: Vanessa Vitse
Jean
Kieffer
Calcul d’isogénies à partir d’équations modulaires en genre 2
Simon
Masson
Verifiable Delay Functions from Supersingular Isogenies and Pairings
Arthur
Lavice
Multiplication over extension fields for Pairing-based Cryptography: an Hardware Point of view
10h30 — 10:45 Break 15 minutes
 

10h45
11h00
Sulamithe
Tsakou
Attaque par calcul d’indices sur les Jacobiennes de courbes hyperelliptiques munies d’endomorphismes
Youssef
El Housni
Optimized and secure pairing-friendly elliptic curve suitable for one layer proof composition
Andy
Russon
The quest for an exception-free windowing elliptic curve scalar multiplication
 

11h00
11h40
Chair: Sonia Belaïd
Loïc
Masure
Vers une meilleure compréhension de l’apprentissage
profond appliqué aux attaques par observation
Nicolas
Bordes
High-order private multiplication in characteristic two revisited
11h40 — 11:50 Break 10 minutes
 

11h50
12h30
Lucas
Barthelemy
Toward an Asymmetric White-Box Proposal
Adel
Hamdi
Blind Functional Encryption

Tuesday November 3rd

 

9h30
10h30
Chair: Christina Boura
Paul Huynh Feistel case: when the boomerang comes back
Baptiste Lambin Linearly equivalent S-boxes and the Division Property
Victor Mollimard Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks
10h30 — 10:45 Break 15 minutes
 

10h45
11h00
Durand Amaury Codes duaux des codes de Reed-Solomon linéarisés dans le cadre differentiel
Florette Martinez QMDS codes with minimal length
Maxime Bros An Algebraic Attack on Rank Metric Code-Based Cryptosystems
 

11h00
11h40
Chair: Claire Delaplace
Katharina Boudgoust On the classical hardness of Module-LWE: the linear rank case
Charbel Saliba Key exchange based on Ring-LWE using Barnes-Wall lattices
11h40 — 11:50 Break 10 minutes
 

11h50
12h30
André Schrottenloher Quantum Attacks without Superposition Queries: the Offline Simon’s Algorithm
Yixin Shen Better Quantum Algorithms for Subset-Sums

Wednesday November 4th

GA of GT C2

Thursday November 5th

 

9h30
10h30
Chair: Eleonora Guerrini
Weiqiang Wen Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))
Gabrielle De Micheli Discrete logarithm algorithms in pairing-relevant finite fields
Andrea Lesavourey Retrieving short generators of principal ideals in real Kummer extensions
10h30 — 10:45 Break 15 minutes
 

10h45
11h00
Antonio Florez
Gutierrez
Improving the key recovery in linear cryptanalysis: An application to PRESENT
Olivier Bernard Twisted PHS: Using the product formula to solve Approx-SVP on ideal lattices
Guillaume Kaim Post-quantum e-voting scheme
 

11h00
11h40
Chair: Aurore Guillevic
Isabella Panaccione The Power Error Locating Pairs algorithm
Matthieu Lequesne On the security of subspace subcodes of Reed-Solomon codes for public key encryption
11h40 — 11:50 Break 10 minutes
 

11h50
12h30
Aude Le Gluher Complexité asymptotique fine du crible algébrique
Manon Bertin Understanding the complexity of an algebraic attack on the superdetermined DAGS system

Friday November 6th

 

9h15
10h35
Chair: Malika Izabachène
Ida Tucker Bandwith efficient threshold ECDSA
Chloé Hébant Linearly-Homomorphic Signatures and Scalable Mix-Nets
Rémi Clarisse Efficacité globale des protocoles à base de couplage
Laura Brouilhet Round-Optimal Constant-Size Blind Signatures
10h35 — 10:45 Break 10 minutes
 

10h45
11h00
Céline Duguet Zero-knowledge proofs for MLS
Abbass Madi A secure approach for Neural Networks using Homomorphic Encryption and Verifiable Computation
Florian Caullery Exploring Parallelization Strategies for SPHINCS+
 

11h00
11h40
Chair: Sihem Mesnager
Simon Abelard Un algorithme (plus) rapide pour calculer des espaces de Riemann-Roch
Sarah Bordage Interactive Oracle Proof of Proximity for Products of Reed-Solomon Codes
11h40 — 11:50 Break 10 minutes
 

11h50
12h30
Ilaria Zappatore Enhancing simultaneous rational function reconstruction with errors: adaptive error correction capability and new bounds for applications
Jade Nardi Explicit construction and parameters of projective toric codes

 

Comments are closed.