lundi 30 mars 2026
| Heures | événement | (+) |
| 09:00 - 09:30 | Mot d'accueil (Plénière VVF) | |
| 09:30 - 10:30 | Plénière (Plénière VVF) | (+) |
| 09:30 - 10:30 | › The geometry of one-weight linear codes - Gianira N. Alfarano, Université de Rennes | |
| 10:30 - 11:00 | Pause café (Plénière VVF) | |
| 10:30 - 11:15 | Pause café (Base Tom Souville) | |
| 11:00 - 12:15 | Exposés (Plénière VVF) | (+) |
| 11:00 - 11:25 | › Minimal Additive Codes and Their Underlying Geometry - Marine LE MEUR, Université de Rennes - UFR Mathématiques | |
| 11:25 - 11:50 | › Minimal codewords of certain evaluation codes - Rati Ludhani, Centre Inria de Saclay | |
| 11:50 - 12:15 | › Duals of algebraic geometry codes from Hirzebruch surfaces - Alix Barraud, CNRS; IMB, Université de Bordeaux | |
| 11:15 - 12:30 | Exposés (Base Tom Souville) | (+) |
| 11:15 - 11:40 | › Accréditations Anonymes et Déléguables - Yaël Pajot, Laboratoire de Mathématiques de Versailles | |
| 11:40 - 12:05 | › Code on graph-based Asynchronous Verifiable Secret Sharing - Hugo Delavenne, Geometry, arithmetic, algorithms, codes and encryption | |
| 12:05 - 12:30 | › Cryptographic Commitments on Anonymizable Data - Charlène Jojon, LIFO, Université d'Orléans, INSA Centre Val de Loire, Inria Saclay | |
| 12:30 - 14:00 | Déjeuner à partir de 12h15 | |
| 14:30 - 15:20 | Exposés (Plénière VVF) | (+) |
| 14:30 - 14:55 | › Generic Attacks on Double Block Length Sponge Hashing - César Mathéus, Centre Inria de Paris | |
| 14:55 - 15:20 | › The revised boomerang connectivity tables and their connection to the difference distribution table - Kirpa Garg, université de rouen normandie | |
| 14:30 - 15:20 | Exposés (Base Tom Souville) | (+) |
| 14:30 - 14:55 | › A Gaussian Leftover Hash Lemma for Modules over Number Fields - Joël Felderhoff, Department of Informatics [King's College London] | |
| 14:55 - 15:20 | › On the Randomness of Log-S-unit lattices - Afonso Li, Institut de Mathématiques de Bordeaux | |
| 15:20 - 15:45 | Pause café (Plénière VVF) | |
| 15:20 - 15:45 | Pause café (Base Tom Souville) | |
| 15:45 - 16:35 | Exposés (Plénière VVF) | (+) |
| 15:45 - 16:10 | › Improved preprocessing for the Crossbred algorithm and application to the MQ problem - Damien Vidal, Modélisation, Information et Systèmes - UR UPJV 4290 | |
| 16:10 - 16:35 | › Overdetermined Bilinear Polynomial Systems - Paul Mekhail, Modélisation, Information et Systèmes - UR UPJV 4290 | |
| 15:45 - 16:35 | Exposés (Base Tom Souville) | (+) |
| 15:45 - 16:10 | › Unramified abelian covers with many points - Jean Gasnier, Institut de Mathématiques de Bordeaux | |
| 16:10 - 16:35 | › Application de la méthode Clapoti aux courbes elliptiques ordinaires - Maxime LOUVET, Laboratoire de Mathématiques de Versailles | |
| 18:00 - 19:30 | Cocktail (Plénière VVF) | |
| 19:30 - 20:30 | Dîner |
mardi 31 mars 2026
| Heures | événement | (+) |
| 09:00 - 10:00 | Plénière (Plénière VVF) | (+) |
| 09:00 - 10:00 | › Quantum symmetric cryptanalysis beyond Grover's algorithm - André Schrottenloher, Inria Rennes | |
| 10:00 - 10:30 | Pause café (Plénière VVF) | |
| 10:00 - 10:30 | Pause café (Base Tom Souville) | |
| 10:30 - 11:20 | Exposés (Plénière VVF) | (+) |
| 10:30 - 10:55 | › On the Hardness of Learning With Physical Rounding and Noise from Learning With Error - Emeline Repel, Equipe AMACC - Laboratoire GREYC - UMR6072 | |
| 10:55 - 11:20 | › Randomized Nearest-Colattice with an Approx-CVP Oracle for Arbitrary Norm - Wenwen Xia, Institut de Mathématiques de Bordeaux, School of Cyber Science and Engineering, Shanghai Jiao Tong University | |
| 10:30 - 11:20 | Exposés (Base Tom Souville) | (+) |
| 10:30 - 10:55 | › Differential clustering for Skinny - Thomas Sagot, Laboratoire Lorrain de Recherche en Informatique et ses Applications | |
| 10:55 - 11:20 | › Differential-MITM Attack on 14-round ARADI - Shibam GHOSH, Inria | |
| 11:30 - 12:20 | Exposés (Plénière VVF) | (+) |
| 11:30 - 11:55 | › RSA-CRT using hybrid RNS/PMNS system - Alexy DUTOIS-RUIZ, Université de Toulon - UFR Sciences et Techniques | |
| 11:55 - 12:20 | › Quantum exponentiation and (twisted) Fibonacci numbers - Medhi KERMAOUI, Cryptology, arithmetic : algebraic methods for better algorithms | |
| 11:40 - 12:30 | Exposés (Base Tom Souville) | (+) |
| 11:40 - 12:05 | › Decoding Problem in the Sublinear Regime and Calibration of HQC - Valerian Hatey, ETIS UMR 8051 | |
| 12:05 - 12:30 | › Towards a threshold variant of the HQC cryptosystem and faster shared gcd computations - Lucas Ottow, Exact Computing | |
| 12:30 - 14:00 | Déjeuner à partir de 12h20 | |
| 14:15 - 15:15 | Discussion thématique (Plénière VVF) | |
| 15:15 - 15:45 | Pause café (Plénière VVF) | |
| 15:15 - 15:45 | Pause café (Base Tom Souville) | |
| 15:45 - 17:00 | Exposés (Plénière VVF) | (+) |
| 15:45 - 16:10 | › Fine-Grained Unambiguous Measurements - Quentin Buzet, Centre Inria de Paris | |
| 16:10 - 16:35 | › Quantum Maxwell Decoder for qLDPC codes - Bruno Costa Alves Freire, Centre Inria de Paris, Pasqal | |
| 16:35 - 17:00 | › Quantum Truncated Differential Attacks using Convolutions - Pichollet--mugnier Aurel, Applied Cryptography and Implementation Security | |
| 15:45 - 17:00 | Exposés (Base Tom Souville) | (+) |
| 15:45 - 16:10 | › Linear Code Equivalence Problem Cryptanalysis - Charles Brion, University of Rouen | |
| 16:10 - 16:35 | › Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding - Mickael Hamdad, Faculté des sciences et ingénierie de Sorbonne Université | |
| 16:35 - 17:00 | › Proving modern code-based dual attacks - Charles Meyer-Hilfiger, Université de Rennes, Irisa | |
| 18:15 - 19:00 | Rump Session (Plénière VVF) | |
| 19:00 - 20:30 | Dîner à partir de 19h |
mercredi 1 avril 2026
| Heures | événement | (+) |
| 09:00 - 10:00 | Plénière (Plénière VVF) | (+) |
| 09:00 - 10:00 | › Secure computation and correlated randomness, from theory to practice - Geoffroy Couteau, CNRS, Université Paris Cité | |
| 10:00 - 10:30 | Pause café (Plénière VVF) | |
| 10:00 - 10:30 | Pause café (Base Tom Souville) | |
| 10:30 - 11:20 | Exposés (Plénière VVF) | (+) |
| 10:30 - 10:55 | › Practical Study on Solving Polynomial Systems corresponding to Algebraic Attacks on Symmetric Primitives - Baptiste Daumen, Centre Inria de Paris | |
| 10:55 - 11:20 | › SubkeySearch: Key recovery on pointwise-keyed weak PRFs - Antoine Sidem, Télécom Paris | |
| 10:30 - 11:20 | Exposés (Base Tom Souville) | (+) |
| 10:30 - 10:55 | › Fast Pseudorandom Correlation Functions from Sparse LPN with Applications to Two-Party ECDSA and Schnorr - Lennart Braun, Institut de Recherche en Informatique Fondamentale | |
| 10:55 - 11:20 | › The Signature Scheme Zalcon An integer-friendly variant of Falcon - Gaël CLAUDEL, Centre Inria de l'Université de Rennes | |
| 11:30 - 12:20 | Exposés (Plénière VVF) | (+) |
| 11:30 - 11:55 | › Elliptic curves and isogenies in characteristic 2 - Nicolas Sarkis, INRIA Saclay | |
| 11:55 - 12:20 | › Forensic categories: a framework for SQIsign-like primitives - Ilinca Radulescu, ENS de Lyon and CNRS | |
| 11:40 - 12:30 | Exposés (Base Tom Souville) | (+) |
| 11:40 - 12:05 | › On the Quantum Equivalence between S|LWE⟩ and ISIS - Hermouet Paul, Inria - COSMIQ | |
| 12:05 - 12:30 | › Reduction from the decoding problem to EDCP - Agathe Blanvillain, Inria de Paris | |
| 12:30 - 14:00 | Déjeuner à partir de 12h20 | |
| 19:00 - 20:30 | Dîner à partir de 19h | |
| 20:30 - 22:00 | Assemblée Générale |
jeudi 2 avril 2026
| Heures | événement | (+) |
| 09:00 - 10:00 | Plénière (Plénière VVF) | (+) |
| 09:00 - 10:00 | › Private Set Intersection with dynamic datasets - Melek Onen, EURECOM | |
| 10:00 - 10:30 | Pause café (Plénière VVF) | |
| 10:00 - 10:30 | Pause café (Base Tom Souville) | |
| 10:30 - 11:20 | Exposés (Plénière VVF) | (+) |
| 10:30 - 10:55 | › Étude de méthodes de preuves de contre-mesures face aux attaques par canaux auxiliaires dans le Random Probing Model - Ghozlane Boukacem, CryptoExperts, LIP6 Sorbonne Université | |
| 10:55 - 11:20 | › Towards a Constant Leakage Rate: Verifying Security in the Random-Probing Model - Sara Sahraee, Smart Integrated Electronic Systems | |
| 10:30 - 11:20 | Exposés (Base Tom Souville) | (+) |
| 10:30 - 10:55 | › A computational framework for principally polarized abelian varieties - Etienne Piasecki, Unité de Mathématiques Pures et Appliquées | |
| 10:55 - 11:20 | › Solving the Principal Ideal Problem over quaternionic matrices for isogeny based cryptography. - Julien Soumier, INRIA nancy | |
| 11:30 - 12:20 | Exposés (Plénière VVF) | (+) |
| 11:30 - 11:55 | › Complexity analysis of the Support-Minors modeling of the MinRank problem - Alban Gilard, University of Rouen | |
| 11:55 - 12:20 | › A MinRank-based encryption scheme à la Alekhnovich-Regev - Romaric NEVEU, XLIM | |
| 11:40 - 12:30 | Exposés (Base Tom Souville) | (+) |
| 11:40 - 12:05 | › Cryptanalysis of ZUC - Florent Mazelet | |
| 12:05 - 12:30 | › Differential-Linear Attacks from New Distinguishers: The case of SERPENT and PRESENT - Thierno Mamoudou SABALY, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France | |
| 12:30 - 14:00 | Déjeuner à partir de 12h20 | |
| 14:15 - 15:15 | Discussion thématique (Plénière VVF) | |
| 15:15 - 15:45 | Pause café (Plénière VVF) | |
| 15:15 - 15:45 | Pause café (Base Tom Souville) | |
| 15:45 - 17:00 | Exposés (Plénière VVF) | (+) |
| 15:45 - 16:10 | › Suitable LDPC family for MPC applications - Félix Frelot, XLIM | |
| 16:10 - 16:35 | › Public Traceability in Threshold Decryption - Nathan Papon, Laboratoire Traitement et Communication de lÍnformation | |
| 16:35 - 17:00 | › RHQC: post-quantum ratcheted key exchange from coding assumptions - Julien Juaneda, Fédération ENAC ISAE-SUPAERO ONERA, Laboratoire de recherche coopératif dans les télécommunications spatiales et aéronautiques | |
| 15:45 - 17:00 | Exposés (Base Tom Souville) | (+) |
| 15:45 - 16:10 | › A post-quantum encryption scheme based on linearized Reed-Solomon codes - Kayodé Epiphane Nouetowa, Institut de Recherche Mathématique de Rennes | |
| 16:10 - 16:35 | › Constant-time decoding of Gabidulin codes and their generalizations with application to RQC - Anthony Fraga, Mathématiques & Sécurité de l'information | |
| 16:35 - 17:00 | › Local codes in rank metric - Camille Garnier, XLIM | |
| 18:00 - 19:00 | Cocktail | |
| 19:00 - 20:30 | Banquet |
vendredi 3 avril 2026
| Heures | événement | (+) |
| 09:00 - 09:50 | Exposés (Plénière VVF) | (+) |
| 09:00 - 09:25 | › Théorie et pratique de la cryptographie en boite blanche. - Azevedo Oliveira Paco, Laboratoire de Mathématiques de Versailles, Thales | |
| 09:25 - 09:50 | › Modèles d'apprentissage profond appliqués aux attaques par canaux auxiliaires contre les implémentations sécurisées d'algorithmes de cryptographie post-quantique | |
| 09:00 - 09:50 | Exposés (Base Tom Souville) | (+) |
| 09:00 - 09:25 | › Exploring the Set of APN Functions - Pierre Galissant, Inria | |
| 09:25 - 09:50 | › New Generalized APN functions of the lowest algebraic degree - Noureddine El-Asri, Université de Rouen Normandie | |
| 09:50 - 10:10 | Pause café (Plénière VVF) | |
| 09:50 - 10:10 | Pause café (Base Tom Souville) | |
| 10:10 - 11:00 | Exposés (Plénière VVF) | (+) |
| 10:10 - 10:35 | › Are these lattices isomorphic? A quest for finer invariants - Guilhem Mureau, Institut de Mathématiques de Bordeaux | |
| 10:35 - 11:00 | › Humbert singular relations and linear modular embeddings of modular and Shimura curves - Desirée Gijón Gómez, Inria Nancy | |
| 10:10 - 11:00 | Exposés (Base Tom Souville) | (+) |
| 10:10 - 10:35 | › ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions - Aurélien Boeuf, Inria de Paris | |
| 10:35 - 11:00 | › Masking Security in Prime Field Symmetric Ciphers - Noémie Akpaki, Thales SIX GTS France |