Planning
| Time |
Event |
(+)
|
|
09:00 - 09:30
|
Opening Remarks (Plénière VVF) |
|
|
09:30 - 10:30
|
Plenary (Plénière VVF) |
(+)
|
|
09:30 - 10:30 |
› The geometry of one-weight linear codes - Gianira N. Alfarano, Université de Rennes |
|
|
10:30 - 11:00
|
Coffee break (Plénière VVF) |
|
|
10:30 - 11:15
|
Coffee break (Base Tom Souville) |
|
|
11:00 - 12:15
|
Talks (Plénière VVF) |
(+)
|
|
11:00 - 11:25 |
› Minimal Additive Codes and Their Underlying Geometry - Marine LE MEUR, Université de Rennes - UFR Mathématiques |
|
|
11:25 - 11:50 |
› Minimal codewords of certain evaluation codes - Rati Ludhani, Centre Inria de Saclay |
|
|
11:50 - 12:15 |
› Duals of algebraic geometry codes from Hirzebruch surfaces - Alix Barraud, CNRS; IMB, Université de Bordeaux |
|
|
11:15 - 12:30
|
Talks (Base Tom Souville) |
(+)
|
|
11:15 - 11:40 |
› Accréditations Anonymes et Déléguables - Yaël Pajot, Laboratoire de Mathématiques de Versailles |
|
|
11:40 - 12:05 |
› Code on graph-based Asynchronous Verifiable Secret Sharing - Hugo Delavenne, Geometry, arithmetic, algorithms, codes and encryption |
|
|
12:05 - 12:30 |
› Cryptographic Commitments on Anonymizable Data - Charlène Jojon, LIFO, Université d'Orléans, INSA Centre Val de Loire, Inria Saclay |
|
|
12:30 - 14:00
|
Lunch starting at 12.15pm |
|
|
14:30 - 15:20
|
Talks (Plénière VVF) |
(+)
|
|
14:30 - 14:55 |
› Generic Attacks on Double Block Length Sponge Hashing - César Mathéus, Centre Inria de Paris |
|
|
14:55 - 15:20 |
› The revised boomerang connectivity tables and their connection to the difference distribution table - Kirpa Garg, université de rouen normandie |
|
|
14:30 - 15:20
|
Talks (Base Tom Souville) |
(+)
|
|
14:30 - 14:55 |
› A Gaussian Leftover Hash Lemma for Modules over Number Fields - Joël Felderhoff, Department of Informatics [King's College London] |
|
|
14:55 - 15:20 |
› On the Randomness of Log-S-unit lattices - Afonso Li, Institut de Mathématiques de Bordeaux |
|
|
15:20 - 15:45
|
Coffee break (Plénière VVF) |
|
|
15:20 - 15:45
|
Coffee break (Base Tom Souville) |
|
|
15:45 - 16:35
|
Talks (Plénière VVF) |
(+)
|
|
15:45 - 16:10 |
› Improved preprocessing for the Crossbred algorithm and application to the MQ problem - Damien Vidal, Modélisation, Information et Systèmes - UR UPJV 4290 |
|
|
16:10 - 16:35 |
› Overdetermined Bilinear Polynomial Systems - Paul Mekhail, Modélisation, Information et Systèmes - UR UPJV 4290 |
|
|
15:45 - 16:35
|
Talks (Base Tom Souville) |
(+)
|
|
15:45 - 16:10 |
› Unramified abelian covers with many points - Jean Gasnier, Institut de Mathématiques de Bordeaux |
|
|
16:10 - 16:35 |
› Application de la méthode Clapoti aux courbes elliptiques ordinaires - Maxime LOUVET, Laboratoire de Mathématiques de Versailles |
|
|
18:00 - 19:30
|
Cocktail (Plénière VVF) |
|
|
19:30 - 20:30
|
Dinner |
|
| Time |
Event |
(+)
|
|
09:00 - 10:00
|
Plenary (Plénière VVF) |
(+)
|
|
09:00 - 10:00 |
› Quantum symmetric cryptanalysis beyond Grover's algorithm - André Schrottenloher, Inria Rennes |
|
|
10:00 - 10:30
|
Coffee break (Plénière VVF) |
|
|
10:00 - 10:30
|
Coffee break (Base Tom Souville) |
|
|
10:30 - 11:20
|
Talks (Plénière VVF) |
(+)
|
|
10:30 - 10:55 |
› On the Hardness of Learning With Physical Rounding and Noise from Learning With Error - Emeline Repel, Equipe AMACC - Laboratoire GREYC - UMR6072 |
|
|
10:55 - 11:20 |
› Randomized Nearest-Colattice with an Approx-CVP Oracle for Arbitrary Norm - Wenwen Xia, Institut de Mathématiques de Bordeaux, School of Cyber Science and Engineering, Shanghai Jiao Tong University |
|
|
10:30 - 11:20
|
Talks (Base Tom Souville) |
(+)
|
|
10:30 - 10:55 |
› Differential clustering for Skinny - Thomas Sagot, Laboratoire Lorrain de Recherche en Informatique et ses Applications |
|
|
10:55 - 11:20 |
› Differential-MITM Attack on 14-round ARADI - Shibam GHOSH, Inria |
|
|
11:30 - 12:20
|
Talks (Plénière VVF) |
(+)
|
|
11:30 - 11:55 |
› RSA-CRT using hybrid RNS/PMNS system - Alexy DUTOIS-RUIZ, Université de Toulon - UFR Sciences et Techniques |
|
|
11:55 - 12:20 |
› Quantum exponentiation and (twisted) Fibonacci numbers - Medhi KERMAOUI, Cryptology, arithmetic : algebraic methods for better algorithms |
|
|
11:40 - 12:30
|
Talks (Base Tom Souville) |
(+)
|
|
11:40 - 12:05 |
› Decoding Problem in the Sublinear Regime and Calibration of HQC - Valerian Hatey, ETIS UMR 8051 |
|
|
12:05 - 12:30 |
› Towards a threshold variant of the HQC cryptosystem and faster shared gcd computations - Lucas Ottow, Exact Computing |
|
|
12:30 - 14:00
|
Lunch starting at 12.20pm |
|
|
14:15 - 15:15
|
Discussion Coffee Breaks (Plénière VVF) |
|
|
15:15 - 15:45
|
Coffee break (Plénière VVF) |
|
|
15:15 - 15:45
|
Coffee break (Base Tom Souville) |
|
|
15:45 - 17:00
|
Talks (Plénière VVF) |
(+)
|
|
15:45 - 16:10 |
› Fine-Grained Unambiguous Measurements - Quentin Buzet, Centre Inria de Paris |
|
|
16:10 - 16:35 |
› Quantum Maxwell Decoder for qLDPC codes - Bruno Costa Alves Freire, Centre Inria de Paris, Pasqal |
|
|
16:35 - 17:00 |
› Quantum Truncated Differential Attacks using Convolutions - Pichollet--mugnier Aurel, Applied Cryptography and Implementation Security |
|
|
15:45 - 17:00
|
Talks (Base Tom Souville) |
(+)
|
|
15:45 - 16:10 |
› Linear Code Equivalence Problem Cryptanalysis - Charles Brion, University of Rouen |
|
|
16:10 - 16:35 |
› Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding - Mickael Hamdad, Faculté des sciences et ingénierie de Sorbonne Université |
|
|
16:35 - 17:00 |
› Proving modern code-based dual attacks - Charles Meyer-Hilfiger, Université de Rennes, Irisa |
|
|
18:15 - 19:00
|
Rump Session (Plénière VVF) |
|
|
19:00 - 20:30
|
Dinner starting at 7pm |
|
| Time |
Event |
(+)
|
|
09:00 - 10:00
|
Plenary (Plénière VVF) |
(+)
|
|
09:00 - 10:00 |
› Secure computation and correlated randomness, from theory to practice - Geoffroy Couteau, CNRS, Université Paris Cité |
|
|
10:00 - 10:30
|
Coffee break (Plénière VVF) |
|
|
10:00 - 10:30
|
Coffee break (Base Tom Souville) |
|
|
10:30 - 11:20
|
Talks (Plénière VVF) |
(+)
|
|
10:30 - 10:55 |
› Practical Study on Solving Polynomial Systems corresponding to Algebraic Attacks on Symmetric Primitives - Baptiste Daumen, Centre Inria de Paris |
|
|
10:55 - 11:20 |
› SubkeySearch: Key recovery on pointwise-keyed weak PRFs - Antoine Sidem, Télécom Paris |
|
|
10:30 - 11:20
|
Talks (Base Tom Souville) |
(+)
|
|
10:30 - 10:55 |
› Fast Pseudorandom Correlation Functions from Sparse LPN with Applications to Two-Party ECDSA and Schnorr - Lennart Braun, Institut de Recherche en Informatique Fondamentale |
|
|
10:55 - 11:20 |
› The Signature Scheme Zalcon An integer-friendly variant of Falcon - Gaël CLAUDEL, Centre Inria de l'Université de Rennes |
|
|
11:30 - 12:20
|
Talks (Plénière VVF) |
(+)
|
|
11:30 - 11:55 |
› Elliptic curves and isogenies in characteristic 2 - Nicolas Sarkis, INRIA Saclay |
|
|
11:55 - 12:20 |
› Forensic categories: a framework for SQIsign-like primitives - Ilinca Radulescu, ENS de Lyon and CNRS |
|
|
11:40 - 12:30
|
Talks (Base Tom Souville) |
(+)
|
|
11:40 - 12:05 |
› On the Quantum Equivalence between S|LWE⟩ and ISIS - Hermouet Paul, Inria - COSMIQ |
|
|
12:05 - 12:30 |
› Reduction from the decoding problem to EDCP - Agathe Blanvillain, Inria de Paris |
|
|
12:30 - 14:00
|
Lunch starting at 12.20pm |
|
|
19:00 - 20:30
|
Dinner starting at 7pm |
|
|
20:30 - 22:00
|
General Assembly |
|
| Time |
Event |
(+)
|
|
09:00 - 10:00
|
Plenary (Plénière VVF) |
(+)
|
|
09:00 - 10:00 |
› Private Set Intersection with dynamic datasets - Melek Onen, EURECOM |
|
|
10:00 - 10:30
|
Coffee break (Plénière VVF) |
|
|
10:00 - 10:30
|
Coffee break (Base Tom Souville) |
|
|
10:30 - 11:20
|
Talks (Plénière VVF) |
(+)
|
|
10:30 - 10:55 |
› Étude de méthodes de preuves de contre-mesures face aux attaques par canaux auxiliaires dans le Random Probing Model - Ghozlane Boukacem, CryptoExperts, LIP6 Sorbonne Université |
|
|
10:55 - 11:20 |
› Towards a Constant Leakage Rate: Verifying Security in the Random-Probing Model - Sara Sahraee, Smart Integrated Electronic Systems |
|
|
10:30 - 11:20
|
Talks (Base Tom Souville) |
(+)
|
|
10:30 - 10:55 |
› A computational framework for principally polarized abelian varieties - Etienne Piasecki, Unité de Mathématiques Pures et Appliquées |
|
|
10:55 - 11:20 |
› Solving the Principal Ideal Problem over quaternionic matrices for isogeny based cryptography. - Julien Soumier, INRIA nancy |
|
|
11:30 - 12:20
|
Talks (Plénière VVF) |
(+)
|
|
11:30 - 11:55 |
› Complexity analysis of the Support-Minors modeling of the MinRank problem - Alban Gilard, University of Rouen |
|
|
11:55 - 12:20 |
› A MinRank-based encryption scheme à la Alekhnovich-Regev - Romaric NEVEU, XLIM |
|
|
11:40 - 12:30
|
Talks (Base Tom Souville) |
(+)
|
|
11:40 - 12:05 |
› Cryptanalysis of ZUC - Florent Mazelet |
|
|
12:05 - 12:30 |
› Differential-Linear Attacks from New Distinguishers: The case of SERPENT and PRESENT - Thierno Mamoudou SABALY, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France |
|
|
12:30 - 14:00
|
Lunch starting at 12.20pm |
|
|
14:15 - 15:15
|
Discussion Coffee Breaks (Plénière VVF) |
|
|
15:15 - 15:45
|
Coffee break (Plénière VVF) |
|
|
15:15 - 15:45
|
Coffee break (Base Tom Souville) |
|
|
15:45 - 17:00
|
Talks (Plénière VVF) |
(+)
|
|
15:45 - 16:10 |
› Suitable LDPC family for MPC applications - Félix Frelot, XLIM |
|
|
16:10 - 16:35 |
› Public Traceability in Threshold Decryption - Nathan Papon, Laboratoire Traitement et Communication de lÍnformation |
|
|
16:35 - 17:00 |
› RHQC: post-quantum ratcheted key exchange from coding assumptions - Julien Juaneda, Fédération ENAC ISAE-SUPAERO ONERA, Laboratoire de recherche coopératif dans les télécommunications spatiales et aéronautiques |
|
|
15:45 - 17:00
|
Talks (Base Tom Souville) |
(+)
|
|
15:45 - 16:10 |
› A post-quantum encryption scheme based on linearized Reed-Solomon codes - Kayodé Epiphane Nouetowa, Institut de Recherche Mathématique de Rennes |
|
|
16:10 - 16:35 |
› Constant-time decoding of Gabidulin codes and their generalizations with application to RQC - Anthony Fraga, Mathématiques & Sécurité de l'information |
|
|
16:35 - 17:00 |
› Local codes in rank metric - Camille Garnier, XLIM |
|
|
18:00 - 19:00
|
Cocktail |
|
|
19:00 - 20:30
|
Banquet |
|
| Time |
Event |
(+)
|
|
09:00 - 09:50
|
Talks (Plénière VVF) |
(+)
|
|
09:00 - 09:25 |
› Théorie et pratique de la cryptographie en boite blanche. - Azevedo Oliveira Paco, Laboratoire de Mathématiques de Versailles, Thales |
|
|
09:25 - 09:50 |
› Modèles d'apprentissage profond appliqués aux attaques par canaux auxiliaires contre les implémentations sécurisées d'algorithmes de cryptographie post-quantique |
|
|
09:00 - 09:50
|
Talks (Base Tom Souville) |
(+)
|
|
09:00 - 09:25 |
› Exploring the Set of APN Functions - Pierre Galissant, Inria |
|
|
09:25 - 09:50 |
› New Generalized APN functions of the lowest algebraic degree - Noureddine El-Asri, Université de Rouen Normandie |
|
|
09:50 - 10:10
|
Coffee break (Plénière VVF) |
|
|
09:50 - 10:10
|
Coffee break (Base Tom Souville) |
|
|
10:10 - 11:00
|
Talks (Plénière VVF) |
(+)
|
|
10:10 - 10:35 |
› Are these lattices isomorphic? A quest for finer invariants - Guilhem Mureau, Institut de Mathématiques de Bordeaux |
|
|
10:35 - 11:00 |
› Humbert singular relations and linear modular embeddings of modular and Shimura curves - Desirée Gijón Gómez, Inria Nancy |
|
|
10:10 - 11:00
|
Talks (Base Tom Souville) |
(+)
|
|
10:10 - 10:35 |
› ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions - Aurélien Boeuf, Inria de Paris |
|
|
10:35 - 11:00 |
› Masking Security in Prime Field Symmetric Ciphers - Noémie Akpaki, Thales SIX GTS France |
|
|