30 Mar-3 Apr 2026 Côte d'Opale (France)

Planning

Monday, March 30, 2026

Time Event (+)
09:00 - 09:30 Opening Remarks (Plénière VVF)  
09:30 - 10:30 Plenary (Plénière VVF) (+)  
09:30 - 10:30 › The geometry of one-weight linear codes - Gianira N. Alfarano, Université de Rennes  
10:30 - 11:00 Coffee break (Plénière VVF)  
10:30 - 11:15 Coffee break (Base Tom Souville)  
11:00 - 12:15 Talks (Plénière VVF) (+)  
11:00 - 11:25 › Minimal Additive Codes and Their Underlying Geometry - Marine LE MEUR, Université de Rennes - UFR Mathématiques  
11:25 - 11:50 › Minimal codewords of certain evaluation codes - Rati Ludhani, Centre Inria de Saclay  
11:50 - 12:15 › Duals of algebraic geometry codes from Hirzebruch surfaces - Alix Barraud, CNRS; IMB, Université de Bordeaux  
11:15 - 12:30 Talks (Base Tom Souville) (+)  
11:15 - 11:40 › Accréditations Anonymes et Déléguables - Yaël Pajot, Laboratoire de Mathématiques de Versailles  
11:40 - 12:05 › Code on graph-based Asynchronous Verifiable Secret Sharing - Hugo Delavenne, Geometry, arithmetic, algorithms, codes and encryption  
12:05 - 12:30 › Cryptographic Commitments on Anonymizable Data - Charlène Jojon, LIFO, Université d'Orléans, INSA Centre Val de Loire, Inria Saclay  
12:30 - 14:00 Lunch starting at 12.15pm  
14:30 - 15:20 Talks (Plénière VVF) (+)  
14:30 - 14:55 › Generic Attacks on Double Block Length Sponge Hashing - César Mathéus, Centre Inria de Paris  
14:55 - 15:20 › The revised boomerang connectivity tables and their connection to the difference distribution table - Kirpa Garg, université de rouen normandie  
14:30 - 15:20 Talks (Base Tom Souville) (+)  
14:30 - 14:55 › A Gaussian Leftover Hash Lemma for Modules over Number Fields - Joël Felderhoff, Department of Informatics [King's College London]  
14:55 - 15:20 › On the Randomness of Log-S-unit lattices - Afonso Li, Institut de Mathématiques de Bordeaux  
15:20 - 15:45 Coffee break (Plénière VVF)  
15:20 - 15:45 Coffee break (Base Tom Souville)  
15:45 - 16:35 Talks (Plénière VVF) (+)  
15:45 - 16:10 › Improved preprocessing for the Crossbred algorithm and application to the MQ problem - Damien Vidal, Modélisation, Information et Systèmes - UR UPJV 4290  
16:10 - 16:35 › Overdetermined Bilinear Polynomial Systems - Paul Mekhail, Modélisation, Information et Systèmes - UR UPJV 4290  
15:45 - 16:35 Talks (Base Tom Souville) (+)  
15:45 - 16:10 › Unramified abelian covers with many points - Jean Gasnier, Institut de Mathématiques de Bordeaux  
16:10 - 16:35 › Application de la méthode Clapoti aux courbes elliptiques ordinaires - Maxime LOUVET, Laboratoire de Mathématiques de Versailles  
18:00 - 19:30 Cocktail (Plénière VVF)  
19:30 - 20:30 Dinner  

Tuesday, March 31, 2026

Time Event (+)
09:00 - 10:00 Plenary (Plénière VVF) (+)  
09:00 - 10:00 › Quantum symmetric cryptanalysis beyond Grover's algorithm - André Schrottenloher, Inria Rennes  
10:00 - 10:30 Coffee break (Plénière VVF)  
10:00 - 10:30 Coffee break (Base Tom Souville)  
10:30 - 11:20 Talks (Plénière VVF) (+)  
10:30 - 10:55 › On the Hardness of Learning With Physical Rounding and Noise from Learning With Error - Emeline Repel, Equipe AMACC - Laboratoire GREYC - UMR6072  
10:55 - 11:20 › Randomized Nearest-Colattice with an Approx-CVP Oracle for Arbitrary Norm - Wenwen Xia, Institut de Mathématiques de Bordeaux, School of Cyber Science and Engineering, Shanghai Jiao Tong University  
10:30 - 11:20 Talks (Base Tom Souville) (+)  
10:30 - 10:55 › Differential clustering for Skinny - Thomas Sagot, Laboratoire Lorrain de Recherche en Informatique et ses Applications  
10:55 - 11:20 › Differential-MITM Attack on 14-round ARADI - Shibam GHOSH, Inria  
11:30 - 12:20 Talks (Plénière VVF) (+)  
11:30 - 11:55 › RSA-CRT using hybrid RNS/PMNS system - Alexy DUTOIS-RUIZ, Université de Toulon - UFR Sciences et Techniques  
11:55 - 12:20 › Quantum exponentiation and (twisted) Fibonacci numbers - Medhi KERMAOUI, Cryptology, arithmetic : algebraic methods for better algorithms  
11:40 - 12:30 Talks (Base Tom Souville) (+)  
11:40 - 12:05 › Decoding Problem in the Sublinear Regime and Calibration of HQC - Valerian Hatey, ETIS UMR 8051  
12:05 - 12:30 › Towards a threshold variant of the HQC cryptosystem and faster shared gcd computations - Lucas Ottow, Exact Computing  
12:30 - 14:00 Lunch starting at 12.20pm  
14:15 - 15:15 Discussion Coffee Breaks (Plénière VVF)  
15:15 - 15:45 Coffee break (Plénière VVF)  
15:15 - 15:45 Coffee break (Base Tom Souville)  
15:45 - 17:00 Talks (Plénière VVF) (+)  
15:45 - 16:10 › Fine-Grained Unambiguous Measurements - Quentin Buzet, Centre Inria de Paris  
16:10 - 16:35 › Quantum Maxwell Decoder for qLDPC codes - Bruno Costa Alves Freire, Centre Inria de Paris, Pasqal  
16:35 - 17:00 › Quantum Truncated Differential Attacks using Convolutions - Pichollet--mugnier Aurel, Applied Cryptography and Implementation Security  
15:45 - 17:00 Talks (Base Tom Souville) (+)  
15:45 - 16:10 › Linear Code Equivalence Problem Cryptanalysis - Charles Brion, University of Rouen  
16:10 - 16:35 › Practical cryptanalysis of pseudorandom correlation generators based on quasi-Abelian syndrome decoding - Mickael Hamdad, Faculté des sciences et ingénierie de Sorbonne Université  
16:35 - 17:00 › Proving modern code-based dual attacks - Charles Meyer-Hilfiger, Université de Rennes, Irisa  
18:15 - 19:00 Rump Session (Plénière VVF)  
19:00 - 20:30 Dinner starting at 7pm  

Wednesday, April 1, 2026

Time Event (+)
09:00 - 10:00 Plenary (Plénière VVF) (+)  
09:00 - 10:00 › Secure computation and correlated randomness, from theory to practice - Geoffroy Couteau, CNRS, Université Paris Cité  
10:00 - 10:30 Coffee break (Plénière VVF)  
10:00 - 10:30 Coffee break (Base Tom Souville)  
10:30 - 11:20 Talks (Plénière VVF) (+)  
10:30 - 10:55 › Practical Study on Solving Polynomial Systems corresponding to Algebraic Attacks on Symmetric Primitives - Baptiste Daumen, Centre Inria de Paris  
10:55 - 11:20 › SubkeySearch: Key recovery on pointwise-keyed weak PRFs - Antoine Sidem, Télécom Paris  
10:30 - 11:20 Talks (Base Tom Souville) (+)  
10:30 - 10:55 › Fast Pseudorandom Correlation Functions from Sparse LPN with Applications to Two-Party ECDSA and Schnorr - Lennart Braun, Institut de Recherche en Informatique Fondamentale  
10:55 - 11:20 › The Signature Scheme Zalcon An integer-friendly variant of Falcon - Gaël CLAUDEL, Centre Inria de l'Université de Rennes  
11:30 - 12:20 Talks (Plénière VVF) (+)  
11:30 - 11:55 › Elliptic curves and isogenies in characteristic 2 - Nicolas Sarkis, INRIA Saclay  
11:55 - 12:20 › Forensic categories: a framework for SQIsign-like primitives - Ilinca Radulescu, ENS de Lyon and CNRS  
11:40 - 12:30 Talks (Base Tom Souville) (+)  
11:40 - 12:05 › On the Quantum Equivalence between S|LWE⟩ and ISIS - Hermouet Paul, Inria - COSMIQ  
12:05 - 12:30 › Reduction from the decoding problem to EDCP - Agathe Blanvillain, Inria de Paris  
12:30 - 14:00 Lunch starting at 12.20pm  
19:00 - 20:30 Dinner starting at 7pm  
20:30 - 22:00 General Assembly  

Thursday, April 2, 2026

Time Event (+)
09:00 - 10:00 Plenary (Plénière VVF) (+)  
09:00 - 10:00 › Private Set Intersection with dynamic datasets - Melek Onen, EURECOM  
10:00 - 10:30 Coffee break (Plénière VVF)  
10:00 - 10:30 Coffee break (Base Tom Souville)  
10:30 - 11:20 Talks (Plénière VVF) (+)  
10:30 - 10:55 › Étude de méthodes de preuves de contre-mesures face aux attaques par canaux auxiliaires dans le Random Probing Model - Ghozlane Boukacem, CryptoExperts, LIP6 Sorbonne Université  
10:55 - 11:20 › Towards a Constant Leakage Rate: Verifying Security in the Random-Probing Model - Sara Sahraee, Smart Integrated Electronic Systems  
10:30 - 11:20 Talks (Base Tom Souville) (+)  
10:30 - 10:55 › A computational framework for principally polarized abelian varieties - Etienne Piasecki, Unité de Mathématiques Pures et Appliquées  
10:55 - 11:20 › Solving the Principal Ideal Problem over quaternionic matrices for isogeny based cryptography. - Julien Soumier, INRIA nancy  
11:30 - 12:20 Talks (Plénière VVF) (+)  
11:30 - 11:55 › Complexity analysis of the Support-Minors modeling of the MinRank problem - Alban Gilard, University of Rouen  
11:55 - 12:20 › A MinRank-based encryption scheme à la Alekhnovich-Regev - Romaric NEVEU, XLIM  
11:40 - 12:30 Talks (Base Tom Souville) (+)  
11:40 - 12:05 › Cryptanalysis of ZUC - Florent Mazelet  
12:05 - 12:30 › Differential-Linear Attacks from New Distinguishers: The case of SERPENT and PRESENT - Thierno Mamoudou SABALY, Université de Lorraine, CNRS, Inria, LORIA, Nancy, France  
12:30 - 14:00 Lunch starting at 12.20pm  
14:15 - 15:15 Discussion Coffee Breaks (Plénière VVF)  
15:15 - 15:45 Coffee break (Plénière VVF)  
15:15 - 15:45 Coffee break (Base Tom Souville)  
15:45 - 17:00 Talks (Plénière VVF) (+)  
15:45 - 16:10 › Suitable LDPC family for MPC applications - Félix Frelot, XLIM  
16:10 - 16:35 › Public Traceability in Threshold Decryption - Nathan Papon, Laboratoire Traitement et Communication de lÍnformation  
16:35 - 17:00 › RHQC: post-quantum ratcheted key exchange from coding assumptions - Julien Juaneda, Fédération ENAC ISAE-SUPAERO ONERA, Laboratoire de recherche coopératif dans les télécommunications spatiales et aéronautiques  
15:45 - 17:00 Talks (Base Tom Souville) (+)  
15:45 - 16:10 › A post-quantum encryption scheme based on linearized Reed-Solomon codes - Kayodé Epiphane Nouetowa, Institut de Recherche Mathématique de Rennes  
16:10 - 16:35 › Constant-time decoding of Gabidulin codes and their generalizations with application to RQC - Anthony Fraga, Mathématiques & Sécurité de l'information  
16:35 - 17:00 › Local codes in rank metric - Camille Garnier, XLIM  
18:00 - 19:00 Cocktail  
19:00 - 20:30 Banquet  

Friday, April 3, 2026

Time Event (+)
09:00 - 09:50 Talks (Plénière VVF) (+)  
09:00 - 09:25 › Théorie et pratique de la cryptographie en boite blanche. - Azevedo Oliveira Paco, Laboratoire de Mathématiques de Versailles, Thales  
09:25 - 09:50 › Modèles d'apprentissage profond appliqués aux attaques par canaux auxiliaires contre les implémentations sécurisées d'algorithmes de cryptographie post-quantique  
09:00 - 09:50 Talks (Base Tom Souville) (+)  
09:00 - 09:25 › Exploring the Set of APN Functions - Pierre Galissant, Inria  
09:25 - 09:50 › New Generalized APN functions of the lowest algebraic degree - Noureddine El-Asri, Université de Rouen Normandie  
09:50 - 10:10 Coffee break (Plénière VVF)  
09:50 - 10:10 Coffee break (Base Tom Souville)  
10:10 - 11:00 Talks (Plénière VVF) (+)  
10:10 - 10:35 › Are these lattices isomorphic? A quest for finer invariants - Guilhem Mureau, Institut de Mathématiques de Bordeaux  
10:35 - 11:00 › Humbert singular relations and linear modular embeddings of modular and Shimura curves - Desirée Gijón Gómez, Inria Nancy  
10:10 - 11:00 Talks (Base Tom Souville) (+)  
10:10 - 10:35 › ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions - Aurélien Boeuf, Inria de Paris  
10:35 - 11:00 › Masking Security in Prime Field Symmetric Ciphers - Noémie Akpaki, Thales SIX GTS France  
Loading... Loading...