Program


Room B05 - ground floor (street level)

09:10 - 09:15 Opening remarks
09:15 - 10:30 First session
Lumora: A family of permutation based wide-block ciphers for PQC zkSNARK applications Guang Gong
Permutation-Based Hash Chains with Application to Password Hashing Charlotte Lefevre
10:30 - 11:00 Coffee Break
11:00 - 13:00 Joint session with "Algebraic Hash Cryptanalysis Days"
Permutation-based cryptography and post-quantum security Dominique Unruh
A Fiat–Shamir Transformation From Duplex Sponges Michele Orrù
13:00 - 14:15 Lunch
14:15 - 15:15 Third session
On Some Variants of Cube-Attack-Like Cryptanalysis on SHA-3 Designs Mohammad Vaziri
On solving challenges in the Keccak Crunchy Crypto Contest Xiaoen Lin
15:15 - 15:45 Coffee Break
15:45 - 17:15 Fourth session
Insights into the Algebraic Structure of Chi Björn Kriepke
Some Observations About the Ascon and Keccak S-box and Potential Applications in Cryptanalysis Nicolas Thaddee Courtois
17:15 - 17:20 Closing remarks