| 08:30 - 09:20 | |
| 09:20 - 09:30 | Opening remarks |
| 09:30 - 10:00 | (ESAT, Belgium) Towards beyond birthday bound secure COPAs |
| 10:00 - 10:45 | (Indian Statistical Institute, India) Lower Bound on the Calls of Block Ciphers in Symmetric-Key Designs [slides] |
| 10:45 - 11:15 | |
| 11:15 - 12:00 | (ANSSI, France) Constructing Tweakable Block Ciphers in the Random Permutation Model [slides] |
| 12:00 - 12:30 | (Chinese Academy of Sciences, China) PMAC-Double: Doubling PMAC with a Single Key [slides] |
| 14:00 - 18:00 | |
| 16:00 - 16:30 |
| 09:15 - 10:00 | (UVSQ, France) Understanding the Division Property |
| 10:00 - 10:45 | (INRIA, France) Generic Attacks against MAC Algorithms [slides] |
| 10:45 - 11:15 | |
| 11:15 - 12:00 | (NTT, Japan) Recent Applications of Hellman's Time-Memory Tradeoff [slides] |
| 12:00 - 12:30 | (Shang Hai Jiao Tong University, China) Optimal Constructions of Universal One-way Hash Functions from Special One-way Functions [slides] |
| 14:00 - 18:00 | |
| 16:00 - 16:30 |
| 19:00 - 23:00 |
| 09:30 - 10:00 | (ESAT, Belgium) XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees [slides] |
| 10:00 - 10:45 | (ANSSI, France) Fault-based Cryptanalysis on Block Ciphers [slides] |
| 10:45 - 11:15 | |
| 11:15 - 12:00 | (EPFL, Switzerland) Online Authenticated Encryption [slides] |
| 12:00 - 12:30 | (Chinese Academy of Sciences, China) Mixed-integer Programming based Differential and Linear Cryptanalysis [slides] |
| 14:00 - 18:00 | |
| 16:00 - 16:30 |
| 09:15 - 09:45 | (Sejong University, Korea) Partition-and-Mix: Generalizing the Swap-or-Not Shuffle [slides] |
| 09:45 - 10:30 | (Graz University of Technology, Austria) Analysis of Kupyna [slides] |
| 10:30 - 11:00 | |
| 11:00 - 11:45 | (NTT, Japan) Part I: The Limited Power of Verification Queries in Message Authentication and Authenticated Encryption [slides] Part II: PMAC's Message Length Dependence [slides] |
| 11:45 - 12:15 | (NEC Corporation, Japan) Efficient Message Authentication Codes with Combinatorial Group Testing [slides] |
| 12:15 - 12:45 | (Nagoya University, Japan) Provable Security Bounds of GCM |
| 14:00 - 16:00 | |
| 16:00 - 16:30 | |
| 16:30 - 17:30 |