Main Program


Wednesday (2024-11-20)

KST 13:30 14:20
UTC 04:30
05:20

(Hall: Auditorium)

Session 1: Cryptanalysis of Block Ciphers
(Session Chair : Bonwook Koo, National Security Research Institute, Korea)

Exploring the Optimal  Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights
Bingqing Li and Ling Sun

Investigation of the Optimal Linear Characteristics of BAKSHEESH
Yuxuan Peng, Jinpeng Liu and Ling Sun

KST 14:20 14:40
UTC 05:20
05:40

Break Time

KST 14:40 15:40
UTC 05:40
06:40

(Hall: Auditorium)

[Invited Talk ]
(Session Chair : Seunghyun Seo, Hanyang University, Korea)
Accordion Mode Development, Donghoon Chang (NIST & Strativia, USA)

KST 15:40 16:00
UTC 06:40
07:00

Break Time

KST 16:00 17:15
UTC 07:00
08:15

(Hall: Auditorium)

Session 2: Cyber Security I
(Session Chair : Woojin Seok, Korea Institute of Science and Technology Information, Korea)

Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications
Shohei Mita and Kazuki Yoneyama

Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs
Wei-Jen Liao, Tao Ban, Shin-Ming Cheng and Takeshi Takahashi

LUA-IoT: Let's Usably Authenticate the IoT
Markus Dahlmanns, Jan Pennekamp, Robin Decker and Klaus Wehrle

 

Thursday (2024-11-21)

KST 10:00 10:50
UTC 01:00
01:50

(Hall: Auditorium)

Session 3 : Signature Schemes
(Session Chair : Jonghwan Park, Sangmyung University, Korea)

Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations
Jiaming Wen, Willy Susilo, Yanhua Zhang, Fuchun Guo and Huanguo Zhang

Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model
Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa

KST 10:50 11:10
UTC 01:50
02:10

Break Time

KST 11:10 12:00
UTC 02:10
03:00

(Hall: Auditorium)

Session 4 : AI Security
(Session Chair : Taekyoung Kwon, Yonsei University, Korea)

Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities
Wenwu Xu, Pengyi Wu, Peng Wang, Guoqiao Zhou and Lidong Zhai

Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS
Harry Chandra Tanuwidjaja, Tao Ban, Takeshi Takahashi, Tsung-Nan Lin, Boyi Lee and Muhamad Erza Aminanto

KST 12:00 13:30
UTC 03:00
04:30

Break Time (Lunch Time in Korea)

KST 13:30 14:30
UTC 04:30
05:30

(Hall: Auditorium)

[Invited Talk II]
(Session Chair : Jongsung Kim, Kookmin University, Korea)
Committing Security of Authenticated Encryption, Yu Sasaki (NTT, Japan)

KST 14:30 14:50
UTC 05:30
05:50

Break Time

KST 14:50 16:05
UTC 05:50
07:05

(Hall: Auditorium)

Session 5 : Applied Cryptography I
(Session Chair : Kwangsu Lee, Sejong University, Korea )

FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism
Suryakant Prasad and Y. Sreenivasa Rao

A Formal Treatment of Envelope Encryption
Shoichi Hirose and Kazuhiko Minematsu

Efficient Privacy-Preserving Counting Method with Homomorphic Encryption
Jae-yun Kim, Saerom Park, Jieun Yun and Jung Hee Cheon

KST 14:50 16:05
UTC 05:50
07:05

(Hall: Conference A)

Session 6 : Applied Cryptography II
(Session Chair : Yousung Kang, Electronics and Telecommunications Research Institute, Korea)

Experimental Analysis of the Optimization-based Factorization Algorithm
Junpei Yamaguchi, Tetsuya Izu and Noboru Kunihiro

Fast Private Set Intersection from Polynomial Multiplication Triples
Kai Chen, Yongqiang Li, Ya Han and Mingsheng Wang

Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation
Jeewoo Jung and Taekyoung Kwon

KST 16:05 16:25

UTC 07:05 07:25

Break Time

KST 16:25 17:40
UTC 07:25
08:40

(Hall: Auditorium)

Session 7 : Quantum Cryptography & Deep Learning based Analysis
(Session Chair : Kyung Chul Jeong, National Security Research Institute, Korea)

RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques
Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim

Quantum Circuit for Curve25519 with Fewer Qubits
Gyeongju Song and Hwajeong Seo

CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography
Duk Young Kim, Kyoungbae Jang, Hyunji Kim, Yujin Oh, Seyoung Yoon and Hwajeong Seo

KST 17:40 18:00
UTC 08:40
09:00

Break Time

KST 18:00 20:30
UTC 09:00
11:30

(Hall: Conference A)

Banquet

 

Friday (2024-11-22)

KST 10:00 10:50
UTC 01:00
01:50

(Hall: Auditorium)

Session 8 : Side-Channel & Automotive Attack
(Session Chair : Myungseo Park, Hansung University, Korea)

REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis
Joonsup Kim, Dongjun Park, Gyusang Kim, Sujin Park, Daehyeon Bae, Heeseok Kim and Seokhie Hong

Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods
Johannes von Richthofen, Christoph Krau
ß, Johann Altgenug, Dominik Spychalski and Wolfgang Hommel

KST 10:50 11:10
UTC 01:50
02:10

Break Time

KST 11:10 12:25
UTC 02:10
03:25

(Hall: Auditorium)

Session 9 : Cyber Security II
(Session Chair : Dongjae Lee Kangwon National University, Korea)

An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors
Mebae Ushida, Takeshi Miyamae, Takeru Fukuoka, Yoshiyuki Sakamaki, Yoshitomo Sakuma, Kota Miyake and Takuya Sakamoto

Malicious node identification based on behavioral statistical features and social relationships
Guangcan Cui, Li-Sheng Huang, Fengjun Zhang, Zuoyuan Niu, Kai Shi and Yunhai Lan

LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System
Suryakant Prasad and Y. Sreenivasa Rao

Farewell