Main Program
KST 13:30 –
14:20 |
Session 1: Cryptanalysis of Block
Ciphers |
Exploring the Optimal Differential
Characteristics of SM4: Improving Automatic Search by Including
Human
Insights |
|
Investigation of the Optimal Linear
Characteristics of
BAKSHEESH |
|
KST 14:20 –
14:40 |
Break Time |
KST 14:40 –
15:40 |
[Invited Talk
Ⅰ] |
KST 15:40 –
16:00 |
Break Time |
KST 16:00 –
17:15 |
Session 2: Cyber Security
I |
Simultaneous Multiplication Protocol based on
Packed Linear Secret Sharing and its
Applications |
|
Reinterpreting System Calls for Enhanced IoT
Malware Analysis Using Function Call
Graphs |
|
LUA-IoT: Let's Usably Authenticate the
IoT |
Thursday (2024-11-21) |
|
KST 10:00 –
10:50 |
Session 3 : Signature
Schemes |
Designated-Verifier Ring Signatures: Strong
Definitions, Generic Constructions and Efficient
Instantiations |
|
Tightly Secure Lattice-based Synchronized
Aggregate Signature in Standard
Model |
|
KST 10:50
–
11:10 |
Break Time |
KST 11:10 –
12:00 |
Session 4 : AI
Security |
Pre-trained Language Models for Alert
Aggregation: Limitations and
Opportunities |
|
Does Ordinality in Encoding Matter for XAI? A
Case Study on Explainable
IDS |
|
KST 12:00
–
13:30 |
Break Time (Lunch Time in Korea) |
KST 13:30 –
14:30 |
[Invited Talk
II] |
KST 14:30
–
14:50 |
Break Time |
KST 14:50 –
16:05 |
Session 5 : Applied Cryptography
I |
FineDReaM : A Boolean Query Searchable
KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval
Mechanism |
|
A Formal Treatment of Envelope
Encryption |
|
Efficient Privacy-Preserving Counting Method with
Homomorphic
Encryption |
|
KST 14:50 –
16:05 |
Session 6 : Applied Cryptography
II |
Experimental Analysis of the Optimization-based
Factorization
Algorithm |
|
Fast Private Set Intersection from Polynomial
Multiplication
Triples |
|
Enhancing Differential Fuzzing of Cryptographic
Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific
Mutation |
|
KST 16:05 – 16:25 UTC 07:05 – 07:25 |
Break Time |
KST 16:25 –
17:40 |
Session 7 : Quantum Cryptography & Deep
Learning based Analysis |
RSA Quantum Cryptanalysis: A Thorough Exploration
of n-Bit Attacks and Emerging Factoring
Techniques |
|
Quantum Circuit for Curve25519 with Fewer
Qubits |
|
CS-Net: A Deep Learning-Based Analysis for the
Cryptography and
Steganography |
|
KST 17:40
–
18:00 |
Break Time |
KST 18:00
–
20:30 |
Banquet |
Friday (2024-11-22) |
|
KST 10:00 –
10:50 |
Session 8 : Side-Channel & Automotive
Attack |
REAF: Replacing Exponential Activation Function
to Prevent Side-Channel
Analysis |
|
Assessment of Automotive Attack Feasibility
Methods in Comparison to Railway and Aviation
Methods |
|
KST 10:50
–
11:10 |
Break Time |
KST 11:10
–
12:25 |
Session 9 : Cyber Security
II |
An Information-Sharing System that Guarantees the
Authenticity and Privacy of
Contributors |
|
Malicious node identification based on behavioral
statistical features and social
relationships |
|
LiST+: An Improved Lightweight Sharable and
Traceable Secure Mobile Health
System |
|
|
Farewell |