September 30 (Sunday)

18:00 - 20:30 Welcome Reception

October 1 (Monday)

8:35 - 08:45 Opening Remarks
8:45 - 10:15 Session 1: Privacy (Session Chair: Panos Papadimitratos)
  • Faster Privacy-Preserving Location Proximity Scheme
  • Kimmo Järvinen (University of Helsinki, Finland) , Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko (TU Darmstadt, Germany) and Zheng Yang (Singapore University of Technology and Design)
  • Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
  • Varsha Bhat and Sudarshan Iyenga (Indian Institute of Technology Ropar)
  • HIKE: Walking the Privacy Trail
  • Elena Pagnin, Carlo Brunetta and Pablo Picazo-Sanchez (Chalmers University of Technology, Sweden)
10:15 - 10:40 Coffee Break
10:40 - 12:10 Session 2: Internet Misbehavior and Protection  (Session Chair: Jan Camenisch)
  • DNS-DNS: DNS-based De-NAT Scheme
  • Liran Orevi (Efi Arazi School of Computer Science, Herzliya Interdisciplinary Center, Israel), Amir Herzberg (University of Connecticut, USA and Bar Ilan University, Israel) and Haim Zlatokrilov (INCD, Israel)
  • CLEF: Limiting the Damage Caused by Large Flows in the Internet Core
  • Hao Wu (University of Illinois at Urbana Champaign and Rubrik Inc., USA), Hsu-Chun Hsiao (National Taiwan University), Daniele E. Asoni, Simon Scherrer, Adrian Perrig (ETH Zurich, Switzerland) and Yih-Chun Hu (University of Illinois at Urbana Champaign, USA)
  • Towards video compression in the encrypted domain: a case-study on the H264 and HEVC macroblock processing pipeline
  • Donald Nokam Kuate (Orange Labs, Applied Crypto Group, and CEA, LIST, France), Sébastien Canard (Orange Labs, Applied Crypto Group, France) and Renaud Sirdey (Orange Labs, Applied Crypto Group, and CEA, LIST, France),
12:10 - 13:10
Keynote Talk 1  (Session Chair: Vincenzo Iovino)
  • Paolo Campegiani (Bit4id, Italy)
  • Regulation and Innovation for Digital Identity
13:10 - 14:00 Lunch
14:00 - 15:20 Session 3: Symmetric key Cryptography  (Session Chair: Yvo Desmedt)
  • The Relation Between CENC and NEMO
  • Bart Mennink (Digital Security Group, Radboud University, The Netherlands)
  • On the Efficiency of ZMAC-Type Modes
  • Yusuke Naito (Mitsubishi Electric Corporation, Japan)
  • Tree-searching for trail bounds
  • Silvia Mella (STMicroelectronics, Italy - Poster presentation, 20 mins)
15:20 - 15:30 Take-away snack and pick-up for the social trip
16:10 - 19:30
Visit to the National Archeological Museum followed by guided walk in the historical center with aperitiv and animation
20:00 - 22:30 Gala dinner at Transatlantico, via Luculliana, 15, Napoli. The participants to the trip can reach the restaurant with the conference shuttle

October 2 (Tuesday)

08:45 - 10:15 Session 4: Signatures I (Session Chair: Koray Karabina)
  • Hierarchical Attribute-based Signatures
  • Daniel Gardham, Constantin Catalin Dragan and Mark Manulis (Surrey Centre for Cyber Security, University of Surrey, UK)
  • Enhanced Security of Attribute-Based Signatures
  • Johannes Blömer, Fabian Eidens and Jakob Juhnke (Department of Computer Science, Paderborn University, Germany)
  • Protean Signature Schemes
  • Stephan Krenn (AIT Austrian Institute of Technology), Henrich C. Pöhls (ISL & Chair of IT-Security, University of Passau, Germany), Kai Samelin (TÜV Rheinland i-sec GmbH, and TU Darmstadt, Germany) and Daniel Slamanig (AIT Austrian Institute of Technology)
10:15 - 10:40 Coffee Break
10:40 - 11:40 Session 5: Signatures II (Session Chair: Jan Camenisch)
  • Code-based signature schemes from identification protocols in the rank metric
  • Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marcos Manzano and Victor Mateu (Darkmatter LLC, UAE)
  • SETLA: Signature and Encryption from Lattices
  • François Gérard and Keno Merckx (Université libre de Bruxelles, Belgium)
11:40 - 12:40
Keynote Talk 2  (Session Chair: Jan Camenisch)
  • Christian Cachin (IBM Research, Switzerland)
  • Distributing Trust with Blockchains
12:40 - 13:40 Lunch
13:40 - 15:30 Session 6: Cryptanalysis I (Session Chair: Marco Baldi)
  • Assessing and countering reaction attacks against post-quantum public-key cryptosystems based on QC-LDPC codes
  • Paolo Santini, Marco Baldi and Franco Chiaraluce (Università Politecnica delle Marche, Italy)
  • Breaking the Hardness Assumption and IND-CPA Security of HQC Submitted to NIST PQC Project
  • Zhen Liu, Yanbin Pan and Tianyuan Xie (Key Laboratory of Mathematics Mechanization, NCMIS, Academy of Mathematics and Systems Science, Chinese Academy of Sciences)
  • Solving small secret LWR using BDD strategy: Modulus switching approach
  • Quoc Huy Le, Pradeep Kumar Mishra (Graduate School of Mathematics, Kyushu University, Japan), Dung Hoang Duong (School of Computing and Information Technology, University of Wollongong, Australia) and Masaya Yasuda (Institute of Mathematics for Industry, Kyushu University and JST, Japan)
  • Reproducible Codes and Cryptographic Applications
  • Edoardo Persichetti (Florida Atlantic University, USA - Poster presentation, 20 mins).
15:30 - 16:00 Coffee break
16:00 - 17:00
Vision speech (Session Chair: Panos Papadimitratos)
  • Fabrizio Leoni (InfoCert, Italy)
  • Digital identity of the objects and the evolution of the PKI in the IoTs

October 3 (Wednesday)

08:45 - 10:15 Session 7: Crypto Protocols (Session Chair: Elena Pagnin)
  • Secret Sharing Schemes for (k,n)-Consecutive Access Structure
  • Javier Herranz and Germán Sáez (Dept. Matemàtiques, Universitat Politècnica de Catalunya and CYBERCAT-Center for Cybersecurity Research of Catalonia, Spain)
  • Extending a Framework for Biometric Visual Cryptography
  • Koray Karabina and Angela Robinson (Florida Atlantic University, USA)
  • Secure Constructions of Multi-channel Broadcast Encryption Schemes in Public Key Framework
  • Kamalesh Acharya and Ratna Dutta (Department of Mathematics, Indian Institute of Technology Kharagpur)
10:15 - 10:45 Coffee Break
08:45 - 10:45 Posters session (Room: Posillipo*; Session Chair: Vincenzo Iovino)
  • Practical quantum-safe implementations in industry
  • Emanuele Bellini (DarkMatter)**
  • The importance of management in addition to technical controls
  • Amal Kotecha (Navyared Ltd, UK)
  • From digital data to digital evidence
  • Mario Ianulardo (Computer crime lawyer, Italy)
  • Blockchain paradigm in secure transfer of biomedical data from Implantable medical devices to Fog Computing layer
  • Krzysztof Daniluk (Warsaw University of Technology, Poland)
  • COMIT - Facilitating trust-less cross blockchain applications
  • Toby Hoenisch (TenX)
  • A proxy re-encryption network to empower privacy in blockchain and decentralized applications
  • David Nunez (Nucypher)**
10:45 - 11:45 Session 8: Cryptanalysis II  (Session Chair: Marco Baldi)
  • Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation
  • Momonari Kudo (Kobe City College of Technology, Japan), Yuki Yokota, Yasushi Takahashi (Graduate School of Mathematics, Kyushu University, Japan) and Masaya Yasuda (Institute of Mathematics for Industry, Kyushu University, Japan)
  • Several MILP-Aided Attacks against SNOW 2.0
  • Yuki Funabiki (Kobe University, Japan), Yosuke Todo (NTT Secure Platform Laboratories, Japan), Takanori Isobe (University of Hyogo, Japan) and Masakatu Morii (Kobe University, Japan)
11:45 - 12:45 Keynote Talk 3  (Session Chair: Amir Herzberg)
  • Pierangela Samarati (University of Milan, Italy)
  • Data security and privacy in emerging scenarios
12:45 - 13:45 Lunch
13:45 - 14:45 Keynote Talk 4  (Session Chair: Yvo Desmedt)
  • Ivan Visconti (University of Salerno, Italy)
  • Delayed-Input Cryptographic Protocols
14:45 - 15:45 Session 9: Crypto Primitives   (Session Chair: Vincenzo Iovino)
  • Fully Secure Identity-based Encryption Resilient to the Auxiliary Leakage under the Decisional Linear Assumption
  • Masahito Ishizaka and Kanta Matsuura (Institute of Industrial Science, The University of Tokyo, Japan)
  • Adaptive-Secure VRFs with Shorter Keys from Static Assumptions
  • Răzvan Roşie (ENS, CNRS, PSL Research University and INRIA, France)
15:45 - 16:05 Coffee break
16:05 - 17:05
Session 10: Malware   (Session Chair: El Mamoun Souidi)
  • Malware Tolerant (Mesh-)Networks
  • Michael Denzel and Mark Ryan (University of Birmingham, UK)
  • Inside GandCrab Ransomware
  • Yassine Lemmou and El Mamoun Souidi (Faculty of Sciences, LabMIASI, Mohammed V University in Rabat, Morocco)
17:05 - 17:15 Closing Remarks

Regular talks: 30 mins including Q&A. Poster presentations do not appear in the proceedings. 
*All talks will be given in the Main Conference Room except for the Poster session of Wednesday held in the Conference Room Posillipo.

**Nucypher and DarkMatter are looking for talents, give a look here to have a chat with them.