21st International Conference on Applied Cryptography and Network Security
Kyoto, Japan
| 19-22 June, 2023
You can click on the name of the workshop to view the details of the corresponding program.
The PDF version of the ACNS 2023 main conference program can be found at the following link: Main Conference Program Detail.
ACNS 2023 Schedule | |||||||
---|---|---|---|---|---|---|---|
Day 1 (19 June) | Day 2 (20 June) | Day 3 (21 June) | Day 4 (22 June) | ||||
Registration 09:00-9:30 |
Machine learning 09:00-10:30 |
CIMSS 09:45-17:00 | Privacy-preserving protocols 09:00-10:30 | ADSC 09:00-12:00 |
Encryption 09:00-10:30 |
SCI 09:00-16:00 |
|
Opening remarks 09:30-09:40 |
Coffee break 10:30-10:50 |
Coffee break 10:30-10:50 |
Coffee break 10:30-10:50 |
||||
Web security 09:40-11:10 |
AIHWS 09:40-17:00 |
Side-channel and fault attacks 10:50-12:20 |
Homomorphic cryptography 10:50-12:00 |
AIoTS 09:00-12:30 |
Advanced primitives 10:50-12:20 |
||
Coffee break 11:10-11:30 |
|||||||
Keynote I 11:30-12:30 |
|||||||
Lunch 12:30-14:00 |
Lunch 12:20-13:50 |
Cloud S&P 15:00-18:30 |
Lunch 12:00-13:30 |
Lunch 12:20-13:50 |
AIBlock 13:50-16:10 |
||
Lattices and codes 14:00-15:55 |
Embedded security 13:50-15:20 |
Keynote II 13:30-14:30 |
Multiparty computation 13:50-15:20 |
||||
Coffee break 15:55-16:15 |
SiMLA(virtual) 15:30-18:30 |
Coffee break 15:20-15:40 |
Tour (Kiyomizu-dera Temple) 14:30-18:00 |
Coffee break 15:20-15:40 |
|||
Symmetric cryptanalysis 16:15-17:45 |
Elliptic curves and pairings 15:40-16:50 |
SecMT(virtual) 16:00-18:20 |
Conference dinner (Heian Jingu Shrine Hall) 18:00-21:00 |
Blockchain 15:40-16:50 |
|||
Poster session 18:00-19:30 |
Isogeny-based cryptography 16:50-18:00 |
Closing remarks 16:50-17:00 |
|||||
Welcome reception 19:00-21:00 |
Day 1 (19 Jun 2023) | |
---|---|
09:00-09:30 | Registration |
09:30-09:40 | Opening remarks Kazumasa Omote & Chunhua Su |
09:40-11:10 | Web security Session Chair: Jianying Zhou Tiny WFP : Lightweight and Effective Website Fingerprinting Via Wavelet Multi-Resolution Analysis Cong Tian, Dengpan Ye, Chuanxi Chen Those Aren't Your Memories and They're Somebody Else's: Seeding Misinformation in Chat Bot Memories Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar Social Honeypot for Humans: Luring Peoplethrough Self-managed Instagram Pages Sara Bardi, Mauro Conti, Luca Pajola, Pier Paolo Tricomi Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao |
11:10-11:30 | Coffee break |
11:30-12:30 | Keynote I Session Chair: Mehdi Tibouchi Challenges and Solutions to Post-Quantum Secure Messaging Shuichi Katsumata |
12:30-14:00 | Lunch |
14:00-15:55 | Lattices and codes Session Chair: Mehdi Tibouchi Forward Security of Fiat-Shamir LatticeSignatures Yang Tao, Rui Zhang, Yunfeng Ji Shorter and Faster Identity-Based Signatures with TightSecurity in the (Q)ROM from Lattices Eric Sageloli, Pierre Pébereau, Pierrick Méaux, Céline Chevalier A Gapless Post-Quantum Hash Proof System in the Hamming Metric Bénédikt Tran, Serge Vaudenay Spherical Gaussian Leftover Hash Lemmaviathe Rényi Divergence Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi BIKE Key-Recovery: Combining Power Consumption Analysisand Information-Set Decoding Agathe Cheriere, Nicolas Aragon, Tania Richmond, Benoît Gérard |
15:55-16:15 | Coffee break |
16:15-17:45 | Symmetric cryptanalysis Session Chair: Serge Vaudenay A Novel Automatic Technique Based on MILP to Search for Impossible Differentials Yong Liu, Zejun Xiang, Siwei Chen, Shasha Zhang, Xiangyong Zeng Meet-in-the-Filterand Dynamic Counting with Applications to Speck Alex Biryukov, Luan Cardoso dos Santos, Je Sen Teh, Aleksei Udovenko, Vesselin Velichkov Near Collision Attackagainst Grain v1 Subhadeep Banik, Daniel Collins, Willi Meier TIDAL: Practical Collisions on State-Reduced KeccakVariants Sahiba Suryawanshi, Dhiman Saha, Shashwat Jaiswal |
18:00-21:00 | Poster session & Welcome reception |
18:00-19:30 | Poster session Session Chair: Masaki Shimaoka Ransomware detection mechanism – project status at the beginning of 2023 Michał Glet, Kamil Kaczyński AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets Joon Kuy Han, Dennis Wong, Byungkon Kang Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Efficiency of MQTT Hung-Yu Chien Stopping Run-time Countermeasures in Cryptographic Primitives Myung-Hyun Kim, Taek-Young Youn, Seungkwang Lee Swarm-based IoT Network Penetration Testing by IoT Devices Thomas Schiller, Sean Mondesire Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance Chunlu CHEN, Kevin I-Kai WANG, Peng LI, Kouichi SAKURAI A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses Haibo Zhang, Zhihua Yao, Kouichi Sakurai Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks Juris Viksna, Sergejs Kozlovics, Edgars Rencis Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems Muhammad Nouman Nafees, Neetesh Saxena, Pete Burnap PriAuct: Privacy Preserving Auction Mechanism Neha Joshi, Abhishek Thakur, A Antony Franklin Using Verifiable Credentials for authentication of UAVs in logistics Ken Watanabe, Kazue Sako A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale Yuji Suga Collaborative Authority-Based Searchable Encryption Using Access Control Encryption Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang |
Day 2 (20 Jun 2023) | |
09:00-10:30 | Machine learning Session Chair: Kouichi Sakurai Fast and Efficient Malware Detection with Joint Staticand Dynamic Features Through Transfer Learning Mao V. Ngo, Tram Truong-Huu, Dima Rabadi, Jia Yi Loo, Sin G. Teo Efficient Network Representation for GNN-based Intrusion Detection Hamdi Friji, Alexis Olivereau, Mireille Sarkiss EVADE:Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim, Frederica Nelson Steal from Collaboration:Spy Attack bya Dishonest Party in Vertical Federated Learning Hongbin Chen, Chaohao Fu, Na Ruan |
10:30-10:50 | Coffee break |
10:50-12:20 | Side-channel and fault attacks Session Chair: Thomas Ricosset Formal Verification of Arithmetic Masking in Hardwareand Software Barbara Gigerl, Robert Primas, Stefan Mangard Layered Binary Templating Martin Schwarzl, Erik Kraft, Daniel Gruss HS-based error correction algorithm for noisy binary GCD side-channel sequences Kenta Tani, Noboru Kunihiro Divide and Rule: DiFA- Division Property Based Fault Attacks on PRESENT and GIFT Anup Kumar Kundu, Shibam Ghosh, Dhiman Saha, Mostafizar Rahman |
12:20-13:50 | Lunch |
13:50-15:20 | Embedded security Session Chair: Hsu-Chun Hsiao A Forkcipher-based Pseudo-Random Number Generator Elena Andreeva, Andreas Weninger DMA'n'Play: Practical Remote Attestation Based on Direct MemoryAccess Sebastian Surminski, Christian Niesler, Lucas Davi, Ahmad-Reza Sadeghi Recommendation for a holistic secure embedded ISA extension Florian Stolz, Marc Fyrbiak, Pascal Sasdrich, Tim Güneysu QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging Dustin Kern, Christoph Krauß, Timm Lauser, Nouri Alnahawi, Alexander Wiesmaier, Ruben Niederhagen |
15:20-15:40 | Coffee break |
15:40-16:50 | Elliptic curves and pairings Session Chair: Jesus-Javier Chi Dominguez Pairings in Rank-1 Constraint System Youssef El Housni Binary Kummer Line Sabyasachi Karati Generalised Asynchronous Remote Key Generation for Pairing-based Cryptosystems Nick Frymann, Daniel Gardham, Mark Manulis, Hugo Nartz |
16:50-18:00 | Isogeny-based cryptography Session Chair: Noboru Kunihiro Low Memory Attacks on Small Key CSIDH Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May Practical Robust DKG Protocols for CSIDH Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen Efficient Isogeny Proofs Using Generic Techniques Kelong Cong, Yi-Fu Lai, Shai Levin |
Day 3 (21 Jun 2023) | |
09:00-10:30 | Privacy-preserving protocols Session Chair: Sherman S.M. Chow Constant-Round Multiparty Private Function Evaluation With (Quasi-)Linear Complexities Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou Predicate Private Set Intersection With Linear Complexity Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou A Framework for UC Secure Privacy Preserving Biometric Authentication using Efficient Functional Encryption Johannes Ernst, Katerina Mitrokotsa Private Information Retrieval with Result Verification for MoreServers Pengzhen Ke, Liang Feng Zhang |
10:30-10:50 | Coffee break |
10:50-12:00 | Homomorphic cryptography Session Chair: Changmin Lee PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Luke Harmon, Gaetan Delavignette, Arnab Roy, David Silva Analysis and Prevention of Averaging Attacks against Obfuscation Protocols Kilian Becher, J. A. Gregor Lagodzinski, Javier Parra Arnau, Thorsten Strufe FLSwitch: Towards Secureand Fast Model Aggregation for Federated Deep Learning with a Learning State-Aware Switch Yunlong Mao, Ziqin Dang, Yu Lin, Tianling Zhang, Yuan Zhang, Jingyu Hua, Sheng Zhong |
12:00-13:30 | Lunch |
13:30-14:30 | Keynote II Session Chair: XiaoFeng Wang Language-enforced Data Confidentiality against Memory Disclosureand Transient Execution Attacks Michalis Polychronakis |
14:30-18:00 | Tour Kiyomizu-dera Temple |
18:00-21:00 | Conference dinner Heian Jingu Shrine Hall |
Day 4 (22 Jun 2023) | |
9:00-10:30 | Encryption Session Chair: Ivan Visconti On the Complete Non-Malleability of the Fujisaki-Okamoto Transform Daniele Friolo, Matteo Salvino, Daniele Ventur Optimal Security Notion for Decentralized Multi-Client Functional Encryption Ky Nguyen, Duong Hieu Phan, David Pointcheval Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions Huangting Wu, Sherman S. M. Chow Publicly Auditable Functional Encryption Vlasis Koutsos, Dimitrios Papadopoulos |
10:30-10:50 | Coffee break |
10:50-12:20 | Advanced primitives Session Chair: Yuji Suga Robustly ReusableFuzzyExtractors in a Post-Quantum World Amit Deo, Charles Grover Subversion-Resilient Authenticated Encryption without Random Oracles Pascal Bemmann, Sebastian Berndt, Denis Diemert, Tibor Jager, Thomas Eisenbarth Scored Anonymous Credentials Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen GeT a CAKE: Generic Transformations from Key Encaspulation Mechanisms to Password Authenticated Key Exchanges Hugo Beguinet, Céline Chevalier, David Pointcheval, Thomas Ricosset, Mélissa Rossi |
12:20-13:50 | Lunch |
13:50-15:20 | Multiparty computation Session Chair: Bernardo David Explicitand Nearly Tight Lower Bound for2-party PerfectlySecureFSS Keitaro Hiwatashi, Koji Nuida Multi-Theorem Fiat-Shamir Transform from Correlation-Intractable Hash Functions Michele Ciampi, Yu Xia Game-Theoretically Secure Protocols for the Ordinal Random Assignment Problem T-H. Hubert Chan, Ting Wen, Hao Xie, Quan Xue A New Approach to Garbled Circuits Anasuya Acharya, Tomer Ashur, Efrat Cohen, Carmit Hazay, Avishay Yanai |
15:20-15:40 | Coffee break |
15:40-16:50 | Blockchain Session Chair: Mario Larangeira Mt. Random: Multi-Tiered Randomness Beacons Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov Revisiting Transaction Ledger Robustness in the Miner ExtractableValueEra Fredrik Kamphuis, Bernardo Magri, Ricky Lamberty, Sebastian Faust An Empirical Analysis of Security and Privacy Risks in Android Cryptocurrency WalletApps I Wayan Budi Sentana, Muhammad Ikram, Mohamed Ali Kaafar |
16:50-17:00 | Closing remarks Mehdi Tibouchi & XiaoFeng Wang |