WEDNESDAY DECEMBER 11, 2019
08:30 - 09:00 Registration
09:10 - 09:30 Introduction
09:30 - 10:30 Session 1: David Naccache, Keynote speaker
How to Compartment Secrets - Trust Everybody, but Cut the Cards -
How to Compartment Secrets - Trust Everybody, but Cut the Cards -
10:30 - 11:00 Coffee Break
11:00 - 12:20 Session 2: Authentication
- A Lattice-based Enhanced Privacy ID
Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen and Leonel Sousa. - A Generic View on the Unified Zero-Knowledge Protocol and its Applications
George Teseleanu and Diana Maimut.
12:20 - 14:00 Lunch
14:00 - 16:00 Session 3A: Cryptography
- Verifiable and Private Oblivious Polynomial Evaluation
Hardik Gajera, Matthieu Giraud, David Gerault, Manik Lal Das and Pascal Lafourcade. - Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations -- With an Illustration on AES --
Simon Landry, Yanis Linge and Emmanuel Prouff. - Strong Designated Verifier Signature Based on the Rank Metric
Hafsa Assidi and El Mamoun Soudi.
16:00 - 16:30 Coffee Break
16:30 - 17:10 Session 3B: Cryptography
- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
Hao Cheng, Daniel Dinu, Johann Groszschaedl, Peter Roenne and Peter Ryan.
17:10 - 18:00 IFIP Working Group 11.2 session
19:00 - 22:00 Gala dinner
------------------------------------------------------------------------
THURSDAY DECEMBER 12, 2019
09:00 - 10:00 Session 4: Pascal Paillier, Keynote speaker
Homomorphic encryption for deep learning: a revolution in the making
Homomorphic encryption for deep learning: a revolution in the making
10:00 - 10:30 Coffee Break
10:30 - 12:15 Session 5: Threats
- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture
Thomas Trouchkine, Guillaume Bouffard and Jessy Clediere. - Threat Analysis of Poisoning Attack against Ethereum Blockchain
Teppei Sato, Mitsuyoshi Imamura and Kazumasa Omote. - A Template-based Method for the Generation of Attack Trees
Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh and Fengjun Zhou.
12:15 - 14:00 Lunch
14:00 - 16:00 Session 6: Cybersecurity
- Analysis of QUIC Session Establishment and its Implementations
Eva Gagliardi and Olivier Levillain. - CompactFlow: A Hybrid Binary Format for Network Flow Data
Michal Piskozub, Riccardo Spolaor and Ivan Martinovic. - SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
Philipp Jakubeit, Wouter Kuijper, Albert Dercksen and Andreas Peter.
16:00 - 16:30 Coffee Break
16:30 - 17:35 Session 7: Internet of Things
- Automated Security Analysis of IoT Software Updates
Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo. - Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
Tidiane Sylla, Mohamed Aymen Chalouf, Francince Krief and Karim Samaké.
18:00 - 21:00 Free visit of CNAM Museum
Accepted papers

12 FULL papers:
- George Teseleanu and Diana Maimut. A Generic View on the Unified Zero-Knowledge Protocol and its Applications
- Thomas Trouchkine, Guillaume Bouffard and Jessy Clediere. Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture
- Philipp Jakubeit, Wouter Kuijper, Albert Dercksen and Andreas Peter. SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities
- Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen and Leonel Sousa. A Lattice-based Enhanced Privacy ID
- Eva Gagliardi and Olivier Levillain. Analysis of QUIC Session Establishment and its Implementations
- Simon Landry, Yanis Linge and Emmanuel Prouff. Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations -- With an Illustration on AES --
- Michal Piskozub, Riccardo Spolaor and Ivan Martinovic. CompactFlow: A Hybrid Binary Format for Network Flow Data
- Teppei Sato, Mitsuyoshi Imamura and Kazumasa Omote. Threat Analysis of Poisoning Attack against Ethereum Blockchain
- Hafsa Assidi and El Mamoun Soudi. Strong Designated Verifier Signature Based on the Rank Metric
- Hardik Gajera, Matthieu Giraud, David Gerault, Manik Lal Das and Pascal Lafourcade. Verifiable and Private Oblivious Polynomial Evaluation
- Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando and Alessio Merlo. Automated Security Analysis of IoT Software Updates
- Hao Cheng, Daniel Dinu, Johann Groszschaedl, Peter Roenne and Peter Ryan. A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things
2 SHORT papers:
- Tidiane Sylla, Mohamed Aymen Chalouf, Francince Krief and Karim Samaké. Towards a Context-Aware Security and Privacy as a Service in the Internet of Things
- Jeremy W. Bryans, Lin Shen Liew, Hoang Nga Nguyen, Giedre Sabaliauskaite, Siraj A. Shaikh and Fengjun Zhou. A Template-based Method for the Generation of Attack Trees