Room B05 - ground floor (street level)
| 09:10 - 09:15 | Opening remarks | 
|---|---|
| 09:15 - 10:30 | First session | 
| Lumora: A family of permutation based wide-block ciphers for PQC zkSNARK applications Guang Gong | |
| Permutation-Based Hash Chains with Application to Password Hashing Charlotte Lefevre | |
| 10:30 - 11:00 | Coffee Break | 
| 11:00 - 13:00 | Joint session with "Algebraic Hash Cryptanalysis Days" | 
| Permutation-based cryptography and post-quantum security Dominique Unruh | |
| A Fiat–Shamir Transformation From Duplex Sponges Michele Orrù | |
| 13:00 - 14:15 | Lunch | 
| 14:15 - 15:15 | Third session | 
| On Some Variants of Cube-Attack-Like Cryptanalysis on SHA-3 Designs Mohammad Vaziri | |
| On solving challenges in the Keccak Crunchy Crypto Contest Xiaoen Lin | |
| 15:15 - 15:45 | Coffee Break | 
| 15:45 - 17:15 | Fourth session | 
| Insights into the Algebraic Structure of Chi Björn Kriepke | |
| Some Observations About the Ascon and Keccak S-box and Potential Applications in Cryptanalysis Nicolas Thaddee Courtois | |
| 17:15 - 17:20 | Closing remarks |