| First Day (9th July 2018) | |
| 0800 - 0900 | Registration |
| 0900 - 0930 | VIP Arrival |
| 0930 - 1030 | CRYPTOLOGY2018 - Officiation Ceremony |
| 1030 - 1100 | Tea Break |
| 1100 - 1120 | Paper 1 - BCTRU: A New Secure NTRUCrypt Public Key System Based on a Newly Multidimensional Algebra |
| 1120 - 1140 | Paper 2 - On The Unsolvability of the Diophantine Equation x1a1 + x2a2 + ... + xmam = nyb and Its Cryptographic Consequences |
| 1140 - 1200 | Paper 3 - Elliptic Net Scalar Multiplication using Generalized Equivalent Elliptic Divisibility Sequence |
| 1200 - 1220 | Paper 4 - Construction of Endomorphisms with J-Invariant 1728 for ISD Method |
| 1220 - 1240 | Paper 5 - Garbage-man-in-the-middle (type 2) Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field |
| 1240 - 1300 | Paper 6 - On the Underlying Hard Lattice Problems of GGH Encryption Scheme |
| 1300 - 1430 | Lunch Break |
| 1430 - 1450 | Paper 7 - Detecting General Algebraic Manipulation Attacks |
| 1450 - 1510 | Paper 8 - Hierarchical Twin-Schnorr Identity-Based Identification Scheme |
| 1510 - 1530 | Paper 9 - Revisiting the Invisibility of Yuen et al.’s Undeniable Signature Scheme |
| 1530 - 1550 | Paper 10 - SSE Security Definitions and Attacks |
| 1550 - 1630 | Tea Break |
| Second Day (10th July 2018) | |
| 0830 - 0900 | Workshop Registration |
| 0900 - 1000 | Blockchain I |
| 1000 - 1015 | Tea break |
| 1015 - 1115 | Blockchain II |
| 1115 - 1130 | Break |
| 1130 - 1230 | Blockchain III |
| 1230 - 1400 | Lunch Break |
| 1400 - 1500 | Implementation of Lattice-based CryptographicPrimitives: Efficiency and Security I |
| 1500 - 1515 | Break |
| 1515 - 1615 | Implementation of Lattice-based CryptographicPrimitives: Efficiency and Security II |
| 1615 - 1630 | Tea Break |
| 1630 - 1730 | Implementation of Lattice-based CryptographicPrimitives: Efficiency and Security III |
| 2100 - 2230 | MSCR 1 Decade Celebration |
| Third Day (11th July 2018) | |
| 0900 - 0920 | Paper 11 - Enhanced AAβ Cryptosystem: The Design |
| 0920 - 0940 | Paper 12 - Extending Pollard Class of Factorable RSA Modulus |
| 0940 - 1000 | Paper 13 - A New Simultaneous Diophantine Attack Upon RSA Moduli N=pq |
| 1000 - 1020 | Paper 14 - New Vulnerability on N=p2q Using Good Approximation of φ(N) |
| 1020 - 1050 | Tea break |
| 1050 - 1110 | Paper 15 - Accelerating DGHV’s Fully Homomorphic Encryption with GPU |
| 1110 - 1130 | Paper 16 - Evaluation Criteria on Random Ambience for Cryptographic Key Generation |
| 1130 - 1150 | Paper 17 - A Practical SCADA Testbed in Electrical Power System Environment for Cyber-security Exercises |
| 1150 - 1200 | Closing Ceremony |
| 1200 - 1430 | Lunch |



