The main conference sessions will be held in A6-008 (Building A6, Auditorium 008)
Workshop sessions are highlighted with light blue color
Monday (March 4)
17:30 – 20:00
Registration
18:30 – 20:00
Keynote and Welcome Reception (room A6-007): Nadia Heninger, University of California, San Diego, USA
Keynote Title: Real-world cryptanalysis
Keynote Title: Real-world cryptanalysis
Tuesday (March 5)
08:00 – 09:00
Registration
09:00 – 09:30
Opening Remarks
09:10
A6-002B
09:30 – 10:30
Keynote 1: Gene Tsudik
University of California, Irvine
CAPTCHAs: What Are They Good For?
University of California, Irvine
CAPTCHAs: What Are They Good For?
10:30 – 11:00
Coffee Break
Smart Infrastructures, Systems & Software
Session #1 – Chair: Marie Khair
11:00 – 12:40
-
Self-Sovereign Identity for Electric Vehicle Charging
-
“Hello? Is there anybody in there?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure
-
Security Analysis of BigBlueButton and eduMEET
- An In-depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation
- ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security
12:40 – 14:00
Lunch
Cryptographic Protocols I
Session #2 – Chair: Anna Lisa Ferrara
14:00 – 15:20
- CryptoZoo: A Viewer for Cryptographic Reduction Proofs
- Element Distinctness and Bounded Input Size in Private Set Intersection and Its Variants
- A New Approach to Efficient Secure Fixed-point Computation
- Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
15:20 – 15:40
Coffee Break
Cryptographic Protocols II
Session #3 – Chair: Mark Manulis
15:40 – 17:00
- Verification Protocol for Stable Matching from Conditional Disclosure of Secrets
- Non-malleable Fuzzy Extractors
- Upgrading Fuzzy Extractors
- X-Lock: a secure XOR-based fuzzy extractor for resource constrained devices
Wednesday (March 6)
08:00 – 09:00
Registration
Post-Quantum
Session #4 – Chair: Francisco Rodriguez-Henriquez
09:00 – 10:40
- Automated Issuance of Post-Quantum Certificates: a New Challenge
- Algorithmic Views of Vectorized Polynomial Multipliers – NTRU Prime
- Efficient Quantum-safe Distributed PRF and Applications: Playing DiSE in a Quantum World
- On the Untapped Potential of the Quantum FLT-based Inversion
- Breaking DPA-protected Kyber via the pair-pointwise multiplication
10:40 – 11:00
Coffee Break
Signatures
Session #5 – Chair: Bo-Yin Yang
11:00 – 12:40
- Subversion-Resilient Signatures without Random Oracles
- Practical Lattice-Based Distributed Signatures for a Small Number of Signers
- Building MPCitH-based Signatures from MQ, MinRank, and Rank SD
- Exploring SIDH-based Signature Parameters
- Biscuit: New MPCitH Signatures from Structured Multivariate Polynomials
A6-001B
12:40 – 14:00
Lunch
Cryptographic Protocols III
Session #6 – Chair: Barbara Massuci
14:00 – 15:00
- The Key Lattice Framework for Concurrent Group Messaging
- Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
- Decentralized Private Stream Aggregation from Lattices
A6-001B
15:00 – 22:00
Thursday (March 7)
08:00 – 09:00
Registration
09:00 – 09:55
Keynote 2: Elisa Bertino
Purdue University, Indiana, USA
Applying Machine Learning to Securing Cellular Networks
Purdue University, Indiana, USA
Applying Machine Learning to Securing Cellular Networks
09:55 – 10:00
Awards and ACNS 2025 announcement
Users & Usability
Session #7 – Chair: Jianying Zhou
10:00 – 11:00
- How Users Investigate Phishing Emails that Lack Traditional Phishing Cues
- Usable Authentication in Virtual Reality: Exploring the Usability of PINs and Gestures
- Living a Lie: Security Analysis of Facial Liveness Detection Systems in Mobile Apps
11:00 – 11:30
Coffee Break
Attacks
Session #8 – Chair: Elena Kirshanova
11:30 – 12:50
- A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer
- A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation
- Time Is Money, Friend! Timing Side-channel Attack against Garbled Circuit Constructions
- Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48
12:50 – 14:00
Lunch
Encrypted Data
Session #9 – Chair: Fatemeh (Saba) Ganji
14:00 – 15:40
- Efficient Clustering on Encrypted Data
- Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search
- Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections
- Two-Party Decision Tree Training from Updatable Order-Revealing Encryption
- KIVR: Committing Authenticated Encryption Using Plaintext Redundancy and Application to GCM, CCM, and More
15:40 – 17:00
Posters and Coffee Break
17:00 – 22:00
Friday (March 8)
08:00 – 09:00
Registration
Blockchain
Session #10 – Chair: Daniele Venturi
09:00 – 10:40
- Mirrored Commitment: Fixing “Randomized Partial Checking” and Applications
- Bitcoin Clique: Channel-free Off-chain Payments using Two-Shot Adaptor Signatures
- Programmable Payment Channels
- Fair Private Set Intersection using Smart Contracts
- Powers-of-Tau to the People: Decentralizing Setup Ceremonies
10:40 – 11:00
Coffee Break
Wireless & Networks
Session #11 – Chair: Syed Khandker
11:00 – 12:20
- A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks
- When and How to Aggregate Message Authentication Codes on Lossy Channels?
- DoSat: A DDoS Attack on the Vulnerable Time-varying Topology of LEO Satellite Networks
- DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining
12:20 – 13:30
Lunch Break
Privacy & Homomorphic Encryption
Session #12 – Chair: Manaar Alam
13:30 – 14:50
- SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations
- Privacy-Preserving Verifiable Convolutional Neural Networks
- A General Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Key-Aggregation
- Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption
14:50 – 15:10
Coffee Break
Symmetric Crypto
Session #13 – Chair: Shahram Rasoolzadeh
15:10 – 16:10
- Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function
- Generalized Initialization of the Duplex Construction
- Alternative key p-schedules for the AES
16:10 – 16:30
Closing Remarks