First Day (26th July 2022) | |
0830 - 0930 | Registration |
0930 - 1000 | CRYPTOLOGY2022 General Chair Welcoming Remarks |
1000 - 1030 | Paper 1 Anonymous Multi-party Identification without Certificates |
1030 - 1100 | Paper 2 Security-Mediated El-Gamal Identity-Based Encryption Scheme |
1100 - 1130 | Paper 3 Trapdoor Function from Weaker Assumption in the Standard Model for Decentralized Network |
1130 - 1230 | Keynote Speech: Assoc. Prof. Dr. Nur Azman Abu Universiti Teknikal Melaka Malaysia |
1230 - 1430 | Lunch Break |
1430 - 1500 | Paper 4 Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings |
1500 - 1530 | Paper 5 SPA on Modular Multiplication in Rabin-p KEM |
1530 | Tea Break |
1900 | Buffet Dinner at Palms Cafe Restaurant |
Second Day (27th July 2022) | |
0900 - 0930 | CRYPTOLOGY2022 Officiation by YBrs. Tn. Johari bin Hashim Director National Cyber Coordination and Command Centre (NC4) National Cyber Security Agency (NACSA) Malaysian National Security Council (MKN) |
0930 - 1000 | Paper 6 The Post-Quantum Probabilistic Full Domain Hash |
1000 - 1030 | Paper 7 Analysis of Permutation Functions for Lightweight Block Cipher Design |
1030 - 1100 | Paper 8 Authentication Methods that use Haptic and Audio: A Review |
1100 - 1130 | Paper 9 Quaternion Algebra in a New Secure Cryptosystem based NTRU |
1130 - 1200 | Paper 10 Embedding-based Attacks on the GGH Lattice-based Cryptosystems |
1200 - 1230 | Paper 11 The Cubic Pell Digital Algorithm CP256-1299 |
1230 - 1430 | Lunch Break |
1430 - 1630 | Light & Easy | Networking |
1630 | Tea Break |
1900 | Buffet Dinner at Palms Cafe Restaurant |
Third Day (28th July 2022) | |
0930 - 1200 | Networking |
1200 - 1230 | Closing Ceremony |