First Day (9th July 2018) |
0800 - 0900 |
Registration |
0900 - 0930 |
VIP Arrival |
0930 - 1030 |
CRYPTOLOGY2018 - Officiation Ceremony |
1030 - 1100 |
Tea Break |
1100 - 1120 |
Paper 1 - BCTRU: A New Secure NTRUCrypt Public Key System Based on a Newly Multidimensional Algebra |
1120 - 1140 |
Paper 2 - On The Unsolvability of the Diophantine Equation x1a1 + x2a2 + ... + xmam = nyb and Its Cryptographic Consequences |
1140 - 1200 |
Paper 3 - Elliptic Net Scalar Multiplication using Generalized Equivalent Elliptic Divisibility Sequence |
1200 - 1220 |
Paper 4 - Construction of Endomorphisms with J-Invariant 1728 for ISD Method |
1220 - 1240 |
Paper 5 - Garbage-man-in-the-middle (type 2) Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field |
1240 - 1300 |
Paper 6 - On the Underlying Hard Lattice Problems of GGH Encryption Scheme |
1300 - 1430 |
Lunch Break |
1430 - 1450 |
Paper 7 - Detecting General Algebraic Manipulation Attacks |
1450 - 1510 |
Paper 8 - Hierarchical Twin-Schnorr Identity-Based Identification Scheme |
1510 - 1530 |
Paper 9 - Revisiting the Invisibility of Yuen et al.’s Undeniable Signature Scheme |
1530 - 1550 |
Paper 10 - SSE Security Definitions and Attacks |
1550 - 1630 |
Tea Break |
|
Second Day (10th July 2018) |
0830 - 0900 |
Workshop Registration |
0900 - 1000 |
Blockchain I |
1000 - 1015 |
Tea break |
1015 - 1115 |
Blockchain II |
1115 - 1130 |
Break |
1130 - 1230 |
Blockchain III |
1230 - 1400 |
Lunch Break |
1400 - 1500 |
Implementation of Lattice-based CryptographicPrimitives: Efficiency and Security I |
1500 - 1515 |
Break |
1515 - 1615 |
Implementation of Lattice-based CryptographicPrimitives: Efficiency and Security II |
1615 - 1630 |
Tea Break |
1630 - 1730 |
Implementation of Lattice-based CryptographicPrimitives: Efficiency and Security III |
|
2100 - 2230 |
MSCR 1 Decade Celebration |
|
Third Day (11th July 2018) |
0900 - 0920 |
Paper 11 - Enhanced AAβ Cryptosystem: The Design |
0920 - 0940 |
Paper 12 - Extending Pollard Class of Factorable RSA Modulus |
0940 - 1000 |
Paper 13 - A New Simultaneous Diophantine Attack Upon RSA Moduli N=pq |
1000 - 1020 |
Paper 14 - New Vulnerability on N=p2q Using Good Approximation of φ(N) |
1020 - 1050 |
Tea break |
1050 - 1110 |
Paper 15 - Accelerating DGHV’s Fully Homomorphic Encryption with GPU |
1110 - 1130 |
Paper 16 - Evaluation Criteria on Random Ambience for Cryptographic Key Generation |
1130 - 1150 |
Paper 17 - A Practical SCADA Testbed in Electrical Power System Environment for Cyber-security Exercises |
1150 - 1200 |
Closing Ceremony |
1200 - 1430 |
Lunch |