Conference Program
Local Time |
Day 1 (14 July) |
|
08:00-08:30 |
Registration |
|
08:30-09:00 |
Welcome Coffee (Building 20 Foyer) |
|
09:00-09:30 |
Opening & Photo |
|
09:30-10:30 |
Jennifer Seberry Lecture (Theatre 3) Title: The Evolution of Cybersecurity Research at CSIRO: A Two- Decade Journey and Future Outlook Speaker: Surya NepalSession Chair: Josef Pieprzyk |
|
10:30-11:00 |
Coffee Break |
|
11:00-12:20 |
Session 1A (Theatre 3) |
Session 1B (Theatre 2) |
12:30-14:00 |
Lunch |
|
14:00-16:00 |
Session 2A (Theatre 3) |
Session 2B (Theatre 2) |
16:00-16:30 |
Coffee Break |
|
16:30-17:10 |
Session 3 (Theatre 3) |
|
17:20-17:50 |
Special Event: In Memory of Ed Dawson (Theatre 3) |
|
18:00-19:30 |
Dinner: Pizza Night |
==================================DAY 1==================================
Session 1A: Cryptographic Foundations and Number Theory
-
Compact Lifting for NTT-unfriendly Modulus (Ying Liu, Xianhui Lu, Yu Zhang, Ruida Wang, Ziyao Liu, Kunpeng Wang)
-
Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience (Ying Cai, Chengyi Qin, Mingqiang Wang)
-
Solving Generalized Approximate Divisor Multiples Problems (Naoki Shimoe, Noboru Kunihiro)
-
Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques (Mengce Zheng, Yansong Feng, Abderrahmane Nitaj, Yanbin Pan)
Session 1B: AI Security and Privacy (1)
-
Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning (Sheldon C. Ebron, Meiying Zhang, Kan Yang)
-
RAGLeak: Membership Inference Attacks on RAG-based Large Language Models (Kaiyue Feng, Guangsheng Zhang, Huan Tian, Heng Xu, Yanjun Zhang, Tianqing Zhu, Ming Ding, Bo Liu)
-
DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning (Zhenzhu Chen, Yansong Gao, Anmin Fu, Fanjian Zeng, Boyu Kuang, Robert H. Deng)
-
FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory (Haocheng Ye, Lu Zhou, Hao Wang, Chunpeng Ge)
Session 2A: Digital Signatures and Zero Knowledge
-
Compressed Sigma Protocols: New Model and Aggregation Techniques (Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au)
-
Glitter: A Fully Adaptive and Tightly Secure Threshold Signature (Shaolong Tang, Peng Jiang, Liehuang Zhu)
-
Faster VOLEitH Signatures from All-but-One Vector Commitment and Half-Tree (Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem)
-
Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures (Dung Bui)
-
Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption (Bowen Jiang, Guofeng Tang, Haiyang Xue)
-
Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit (Tianyou Tang, Shuqin Fan)
Session 2B: ystem and Software Security
-
Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases (Xiaowei Zhang, Shigang Liu, Jun Zhang, Yang Xiang)
-
Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities (Jingzi Meng, Yuewu Wang, Lingguang Lei, Chunjing Kou, Peng Wang, Huawei Lu)
-
Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics (Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry)
-
SoK: From Systematization to Best Practices in Fuzz Driver Generation (Qian Yan, Minhuan Huang, Huayang Cao, Shuaibing Lu)
-
Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps (Chuer Yu, Haoyu Wang, Xia Liu, Zonghui Wang, Lirong Fu, Zhiyuan Wan, Yandong Gao, Yang Xiang, Wenzhi Chen)
-
Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection (Guoan Liu, Jian Lin, Weiyu Dong, Jiaan Liu, Tieming Liu)
Session 3: Cryptology & AI
-
Zeroth-Order Federated Private Tuning for Pretrained Large Language Models (Xiaoyu Zhang, Yong Lin, Meixia Miao, Jian Lou, Jin Li, Xiaofeng Chen)
-
Unbounded Multi-Hop Proxy Re-Encryption with HRA Security: An LWE-Based Optimization (Xiaohan Wan, Yang Wang, Haiyang Xue, Mingqiang Wang)
Local Time |
Day 2 (15 July) |
|
08:45-09:00 |
Registration (Building 20 Foyer) |
|
09:00-10:00 |
Keynote Session (Theatre 3) Title: KEMs and Their Applications to Quantum-Safe Communications
Speaker: Rei Safavi-NainiSession Chair: Willy Susilo |
|
10:00-10:30 |
Coffee Break |
|
10:30-11:50 |
Session 4A (Theatre 3) |
Session 4B (Theatre 2) |
12:00-12:30 |
Special Event: 30th ACISP Memory |
|
12:30-14:00 |
Lunch |
|
14:00-16:00 |
Session 5A (Theatre 3) |
Session 5B (Theatre 2) |
16:00-16:20 |
Coffee Break |
|
16:20-17:20 |
ACISP Steering Committee Meeting (Theatre 3) |
|
17:20-18:00 |
Travel to Banquet (Free Bus 55A) |
|
18:00-22:00 |
Banquet Location: Harbourfront Seafood Restaurant Address: Ground Floor, 2 Endeavour Dr, Wollongong Note: Use your name badge to check in |
==================================DAY 2==================================
Session 4A: Post-Quantum Cryptography (1)
-
Partial Key Exposure Attacks on UOV and Its Variants (Yuki Seto, Hiroki Furue, Atsushi Takayasu)
-
Fiat-Shamir with Rejection and Rotation (Xianhui Lu, Yongjian Yin, Dingding Jia, Jingnan He, Yamin Liu, Yijian Liu, Hongbo Liu)
-
Amoeba: More Flexible RLWE-based KEM (Qingfeng Wang, Li-Ping Wang)
-
Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-based Self-Comparison Oracle (Zhenzhi Lai, Udaya Parampalli)
Session 4B: Privacy Enhancing Technologies (1)
-
Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy (She Sun, Jiafei Wu, Jian Yang, Li Zhou, Huiwen Wu)
-
Strong Federated Authentication with Password-based Credential against Identity Server Corruption (Changsong Jiang, Chunxiang Xu, Guomin Yang, Li Duan, Jing Wang)
-
Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug&Charge for Shared Vehicles (Kyosuke Hatsugai, Kyoichi Asano, Yuki Sawai, Yohei Watanabe, Mitsugu Iwamoto)
-
EAPIR: Efficient and Authenticated Private Information Retrieval With Fast Server Processing (Hua Shen, Xinjie Li, Zhen Fan, Ge Wu, Mingwu Zhang)
Session 5A: Privacy Enhancing Technologies (2)
-
Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis (Akito Yamamoto, Tetsuo Shibuya)
-
Sentence Embedding Generation Method for Differential Privacy Protection (Yangyang Liu, Wanqi Wang, Jingyu Hua)
-
KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation (Yuan Li, Changji Wang, Shiwen Hu)
-
Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight (Yuanyuan Zhang, Yu Liu, Yahui Wang, Tianqing Zhu, Mingwu Zhang)
Session 5B: Encryption and Homomorphic
-
Ideal Transformations for Public Key Encryption (Yao Cheng, Xianhui Lu, Ziyi Li)
-
Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application (Jiahao Xuan)
-
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection (Yao Cheng, Xianhui Lu, Ziyi Li, Yongjian Yin)
-
Accountability for Server Misbehavior in Homomorphic Secret Sharing (Xinzhou Wang, Shi-Feng Sun, Dawu Gu, Yuan Luo)
-
High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping (Zejiu Tan, Junping Wan, Zoe L. Jiang, Jingjing Fan, Man Ho Au, Siuming Yiu)
-
Refined Error Management for Gate Bootstrapping (Chunling Chen, Xianhui Lu, Binwu Xiang, Bowen Huang, Ruida Wang, Yijian Liu)
Local Time |
Day 3 (16 July) |
|
08:45-09:00 |
Registration (Building 20 Foyer) |
|
09:00-10:00 |
Keynote Session (Theatre 3) Title: A Multi-Enclave Architecture for Blockchains Admitting Proof of Useful Work for Consensus
Speaker: Yuliang ZhengSession Chair: Joonsang Baek |
|
10:00-10:30 |
Coffee Break |
|
10:30-12:30 |
Session 6A (Theatre 3) |
Session 6B (Theatre 2) |
12:30-14:00 |
Lunch |
|
14:00-15:40 |
Session 7A (Theatre 3) |
Session 7B (Theatre 2) |
15:40-16:00 |
Closing (Theatre 3) |
==================================DAY 3==================================
Session 6A: Cryptographic Protocols and Blockchain
-
FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity (Yang Yang, Bingyu Li, Zhenyang Ding, Qianhong Wu, Bo Qin, Qin Wang)
-
TEAKEX: TESLA-Authenticated Group Key Exchange (Qinyi Li, Lise Millerjord, Colin Boyd)
-
SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies (Qishuang Fu, Joseph K. Liu, Shirui Pan, Tsz Hon Yuen)
-
Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks (Jianbin Gao, Ansu Badjie, Qi Xia, Patrick Mukala, Hu Xia, Grace Mupoyi Ntuala)
-
Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols (Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shi-Feng Sun, Dawu Gu)
-
PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain (Hideaki Miyaji, Noriaki Kamiyama)
Session 6B: Symmetric-Key Cryptography and Cryptanalysis
-
Forgery Attacks on SipHash (Kosuke Sasaki, Rikuto Kurahara, Kosei Sakamoto, Takanori Isobe)
-
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities (Subhadeep Banik, Hailun Yan)
-
Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks (Bingqing Li, Ling Sun)
-
Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri (Weizhe Wang, Deng Tang, Haoyang Wang)
-
Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo (Weiqing Deng, Jianing Zhang, Haoyang Wang)
-
Strengthening Key Scheduling of AES-256 with Minimal Software Modifications (Shoma Kawakami, Kazuma Taka, Atsushi Tanaka, Tatsuya Ishikawa, Takanori Isobe)
Session 7A: AI Security and Privacy (2)
-
MG-Det: Deepfake Detection with Multi-Granularity (Ahmed Asiri, Luoyu Chen, Zhiyi Tian, Xiaoyu Ding, Shui Yu)
-
LPIA: Label Preference Inference Attack against Federated Graph Learning (Jiaxue Bai, Lu Shi, Yang Liu, Weizhe Zhang)
-
DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend (Huiwen Wu, Chuan Ma, Xueran Li, Deyi Zhang, Xiaohan Li, She Sun)
-
DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention (Lihua Wang, Jiaojiao Jiang, Salil S. Kanhere, Jiamou Sun, Sanjay Jha, Zhenchang Xing)
-
Understanding the Robustness of Machine Unlearning Models (Guanqin Zhang, Feng Xu, H.M.N. Dilum Bandara, Shiping Chen, Yulei Sui)
Session 7B: Post-Quantum Cryptography (2)
-
Towards Quantum Security of Hirose Compression Function and Romulus-H (Shaoxuan Zhang, Chun Guo, Meiqin Wang)
-
Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium (Dixiao Du, Yuejun Liu, Yiwen Gao, Jingdian Ming, Hao Yuan, Yongbin Zhou)
-
Efficient Revocable Identity-Based Encryption from Middle-Product LWE (Takumi Nishimura, Atsushi Takayasu)
-
Code-based Fully Dynamic Accountable Ring Signatures and Group Signatures using the Helper Methodology (Rishiraj Bhattacharyya, Sreehari Kollath, Christophe Petit)