WEDNESDAY DECEMBER 11, 2019
 
08:30 - 09:00 Registration
 
09:10 - 09:30 Introduction
 
09:30 - 10:30 Session 1: David Naccache, Keynote speaker
How to Compartment Secrets - Trust Everybody, but Cut the Cards -
 
10:30 - 11:00 Coffee Break
 
11:00 - 12:20 Session 2: Authentication
  • A Lattice-based Enhanced Privacy ID
    Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen and Leonel Sousa.
  • A Generic View on the Unified Zero-Knowledge Protocol and its Applications
    George Teseleanu and Diana Maimut.
12:20 - 14:00 Lunch
 
14:00 - 16:00 Session 3A: Cryptography
  • Verifiable and Private Oblivious Polynomial Evaluation
    Hardik Gajera, Matthieu Giraud, David Gerault, Manik Lal Das and Pascal Lafourcade.
  • Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations -- With an Illustration on AES --
    Simon Landry, Yanis Linge and Emmanuel Prouff.
  • Strong Designated Verifier Signature Based on the Rank Metric
    Hafsa Assidi and El Mamoun Soudi.
16:00 - 16:30 Coffee Break
 
16:30 - 17:10 Session 3B: Cryptography
  • A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
    Hao Cheng, Daniel Dinu, Johann Groszschaedl, Peter Roenne and Peter Ryan.
17:10 - 18:00 IFIP Working Group 11.2 session
 
19:00 - 22:00 Gala dinner
 
------------------------------------------------------------------------
 
THURSDAY DECEMBER 12, 2019
 
09:00 - 10:00 Session 4: Pascal Paillier, Keynote speaker
Homomorphic encryption for deep learning: a revolution in the making
 
10:00 - 10:30 Coffee Break
 
10:30 - 12:15 Session 5: Threats
  • Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture
    Thomas Trouchkine, Guillaume Bouffard and Jessy Clediere.
  • Threat Analysis of Poisoning Attack against Ethereum Blockchain
    Teppei Sato, Mitsuyoshi Imamura and Kazumasa Omote.
  • A Template-based Method for the Generation of Attack Trees
    Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh and Fengjun Zhou.
12:15 - 14:00 Lunch
 
14:00 - 16:00 Session 6: Cybersecurity
  • Analysis of QUIC Session Establishment and its Implementations
    Eva Gagliardi and Olivier Levillain.
  • CompactFlow: A Hybrid Binary Format for Network Flow Data
    Michal Piskozub, Riccardo Spolaor and Ivan Martinovic.
  • SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
    Philipp Jakubeit, Wouter Kuijper, Albert Dercksen and Andreas Peter.
16:00 - 16:30 Coffee Break
 
16:30 - 17:35 Session 7: Internet of Things
  • Automated Security Analysis of IoT Software Updates
    Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo.
  • Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
    Tidiane Sylla, Mohamed Aymen Chalouf, Francince Krief and Karim Samaké.
18:00 - 21:00 Free visit of CNAM Museum
 
 

Accepted papers



12 FULL papers:

  • George Teseleanu and Diana Maimut. A Generic View on the Unified Zero-Knowledge Protocol and its Applications
  • Thomas Trouchkine, Guillaume Bouffard and Jessy Clediere. Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture
  • Philipp Jakubeit, Wouter Kuijper, Albert Dercksen and Andreas Peter. SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
  • Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen and Leonel Sousa. A Lattice-based Enhanced Privacy ID
  • Eva Gagliardi and Olivier Levillain. Analysis of QUIC Session Establishment and its Implementations
  • Simon Landry, Yanis Linge and Emmanuel Prouff. Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations -- With an Illustration on AES --
  • Michal Piskozub, Riccardo Spolaor and Ivan Martinovic. CompactFlow: A Hybrid Binary Format for Network Flow Data
  • Teppei Sato, Mitsuyoshi Imamura and Kazumasa Omote. Threat Analysis of Poisoning Attack against Ethereum Blockchain
  • Hafsa Assidi and El Mamoun Soudi. Strong Designated Verifier Signature Based on the Rank Metric
  • Hardik Gajera, Matthieu Giraud, David Gerault, Manik Lal Das and Pascal Lafourcade. Verifiable and Private Oblivious Polynomial Evaluation
  • Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo. Automated Security Analysis of IoT Software Updates
  • Hao Cheng, Daniel Dinu, Johann Groszschaedl, Peter Roenne and Peter Ryan. A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things

2 SHORT papers:

  • Tidiane Sylla, Mohamed Aymen Chalouf, Francince Krief and Karim Samaké. Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
  • Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh and Fengjun Zhou. A Template-based Method for the Generation of Attack Trees