Conference Program
Local Time | AEDT(UTC+11) | Day 1 (28/11/22) |
09:00-09:30 | Registration | |
09:30-09:45 | Inauguration | |
09:45-10:45 |
Jennifer Seberry Lecture Speaker: Huaxiong Wang Session Chair: Willy Susilo |
|
10:45-11:15 | Coffee Break | |
11:15-12:30 |
Session 1: Symmetric-Key Cryptology I (3 talks) Session Chair: Amin Sakzad |
|
12:30-13:40 | Lunch Break | |
13:40-15:20 |
Session 2: Cryptographic Protocols (4 talks) Session Chair: Ron Steinfeld |
|
15:20-15:45 | Coffee Break | |
15:45-17:00 |
Session 3: Post-Quantum Cryptography (3 talks) Session Chair: Tjerand Silde |
|
17:10-18:00 | Australasian Researchers’ Meeting | |
Steering Committee Meeting | ||
Local Time | AEDT(UTC+11) | Day 2 (29/11/2022) |
09:15-09:30 | Registration | |
09:30-10:30 |
Keynote Talk Speaker: Jing Chen Session Chair: Guomin Yang |
|
10:30-10:50 | Coffee Break | |
10:50-12:30 |
Session 4: Blockchain (4 talks) Session Chair: Yannan Li |
|
12:30-13:40 | Lunch Break | |
13:40-15:20 |
Session 5: Public-Key Cryptography (4 talks) Session Chair: Sushmita Ruj |
|
15:20-15:45 | Coffee Break | |
15:45-17:00 |
Session 6: Public-Key Cryptanalysis (3 talks) Session Chair: Dung Duong |
|
18:00-21:00 | Conference Banquet | |
Local Time | AEDT(UTC+11) | Day 3 (30/11/2022) |
09:15-09:30 | Registration | |
09:30-10:30 |
Keynote Talk Speaker: Yuval Yarom Session Chair: Khoa Nguyen |
|
10:30-10:50 | Coffee Break | |
10:50-12:30 |
Session 7: Symmetric-Key Cryptology II (4 talks) Session Chair: Josef Pieprzyk |
|
12:30-12:40 | Closing Remark | |
12:40-14:00 | Lunch Break |
Key Structures: Improved Related-Key Boomerang Attack against the Full AES-256
Jian Guo, Ling Song, Haoyang Wang
Speaker: Jian Guo (in person)
(Best Paper Award)
Truncated Differential Properties of the Diagonal Set of Inputs for 5-round AES
Lorenzo Grassi, Christian Rechberger
Speaker: Lorenzo Grassi (online)
PNB-focused Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
Speaker: Shotaro Miyashita (online)
Verifiable Decryption in the Head
Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter Rønne, Tjerand Silde
Speaker: Tjerand Silde (in person)
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu
Speaker: Puwen Wei (online)
On Security of Fuzzy Commitment Scheme for Biometric Authentication
Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra
Speaker: Sweta Mishra (in person)
SoK: Decentralized Randomness Beacon Protocols
Mayank Raikwar, Danilo Gligoroski
Speaker: Mayank Raikwar (in person)
Fiat-Shamir Signatures based on Module-NTRU
Shi Bai, Austin Beard, Floyd Johnson, Sulani K.B.Vidhanalage, Tran Ngo
Speaker: Floyd Johnson (online)
Speeding-Up Isogeny Computation using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan
Speaker: Kittiphon Phalakarn (in person)
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security
Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld
Speaker: Xiaohui Ding (online)
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts
Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu
Speaker: Xiaofei Wu (online)
(Best Paper Award)
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding
Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu
Speaker: Shenwei Chen (online)
Garrison: A Novel Watchtower Scheme for Bitcoin
Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld
Speaker: Arash Mirzaei (in person)
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics
Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong, Gaopeng Gou
Speaker: Chen Zhao (online)
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda, Koji Nuida
Speaker: Yusaku Maeda (online)
Structure-preserving Linearly Homomorphic Signature with Designated Combiner for Subspace
Yumei Li, Mingwu Zhang, Futai Zhang
Speaker: Yumei Li (online)
TIDE: A novel approach to constructing timed-release encryption
Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia
Speaker: Liam Medley (in person)
Multi-signatures for ECDSA and its Applications in Blockchain
Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
Speaker: Shimin Pan (in person)
Handle the Traces: Revisiting the Attack on ECDSA with EHNP
Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li
Speaker: Jinzheng Cao (online)
Hybrid Dual and Meet-LWE Attack
Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
Speaker: Lei Bi (online)
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018
Wenshuo Guo, Fang-Wei Fu
Speaker: Wenshuo Guo (online)
Improved Differential Attack on Round-Reduced LEA
Yuhan Zhang, Wenling Wu, Lei Zhang
Speaker: Yuhan Zhang (online)
Implementing Grover Oracle for Lightweight Block Ciphers under Depth Constraints
Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
Speaker: Amit Kumar Chauhan (online)
Improved Division Property for Ciphers with Complex Linear Layers
Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang
Speaker: Yongxia Mao (online)
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
Speaker: Alexandre Adomnicai (online)