20th International Conference on
Applied Cryptography and Network Security

Program at glance

All the times are in CET (GMT+2)

The venue is arranged with three different rooms. We will use the webinar to stream the works of the main conference from the auditorium of CNR, while we will stream the two concurrent workshops in two other rooms. In this way, every attendee can choose to attend the main conference or one of the two workshops running in parallel.

Main conference

From 8:45 Reception of participants

09:15 - 9.30 Welcoming Remarks: PC Chairs and General Chairs

09:30 - 11:00 Session 1: ENCRYPTION

11:00 - 11:30 Coffee Break

11:30 - 13:00 Session 2: ATTACKS 1

13:00 - 14:00 Lunch Break

14:00 - 15:00 Invited Talk
Susan Hohenberger Waters

15:00 - 15:30 Coffee Break

15:30 - 17:30 Session 3: CRYPTOGRAPHIC PROTOCOLS

From 17:30 Poster session + Welcome reception @Museo dell'Arte Classica

Workshops

09:30 – 13:00 CIMSS (3 papers + 2 invited talks)

  • Nils Ole Tippenhauer (CISPA, Germany)
    “Oh What a Tangled Web We Weave - Securing ICS Networks”

  • Zoran Kapelan (TU Delft, Netherlands)
    “Urban Water Infrastructure: Challenges and Smart Solutions”

14:50 – 17:30 SecMT (2 papers + 2 invited talks)

  • Simone Aonzo (EURECOM, France)
    “Trust, But Verify: A Longitudinal Analysis of Android OEM Compliance and Customization”

  • Antonio Bianchi (Purdue University, Indiana, USA)
    “From the Analysis of Mobile Apps to the Analysis of the Mobile Ecosystem”

Main conference

09:00 - 10:30 Session 4: SYSTEM SECURITY

10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 5: ATTACKS 2

12:30 - 14:00 Lunch Break

14:00 - 16:00 Session 6: CRYPTOGRAPHIC PRIMITIVES 1

16:00 - 16:30 Coffee Break

16:30 - 18:30 Session 7: MPC 1

Workshops

09:00 - 18:30 AIBlock (7 papers + 1 invited talk)

  • Sherman S. M. Chow (Chinese University of Hong Kong, China)
    “Towards Decentralized Privacy-Preserving Application Intelligence”

14:00 - 18:30 AIHWS (6 papers + 1 invited talk)

  • Rosario Cammarota (Intel, USA)
    “Homomorphic Computing: Achieving the Pinnacle of Data Privacy”

Main conference

09:00 - 10:30 Session 8: MPC 2

10:30 - 11:00 Coffee Break

11:00 - 12:30 Session 9: ATTACKS 3

12:30 - 14:00 Lunch Break

14:00 - 15:00 Invited Talk: Raluca Ada Popa

15:00 - 15:30 Coffee Break

15:30 - 17:00 Session 10: BLOCKCHAIN

From 17:00 Guided tour of Rome + Social dinner

Workshops

09:00 - 13:00 Cloud S&P (3 papers + 2 invited talks)

  • Vijay Varadharajan (University of Newcastle, Australia)
    “Notions of Security and Trust in Virtualized Infrastructures”

  • Paria Shirani (Toronto Metropolitan University, Canada)
    “Vulnerability Detection for Emerging Technologies”

09:00 - 13:00 SiMLA (4 papers + 1 invited talk)

  • Jun Sun (SMU, Singapore)
    “Towards Trustworthy AI”

Main conference

09:00 - 10:30 Session 11: BLOCK-CIPHERS

10:30 - 11:00 Coffee Break

11:00 - 13:00 Session 12: CRYPTOGRAPHIC PRIMITIVES 2

13:00 - 14:00 Lunch Break

14:00 - 16:00 Session 13: POST-QUANTUM CRYPTOGRAPHY

16:00 - 16:15 Closing remarks and committee acknowledgment

Workshops

09:00 - 13:00 SCI (3 papers + 1 invited talk)

  • Christian Mainka & Vladislav Mladenov (Ruhr University Bochum, Germany)
    “Hey... it’s a PDF. What can go wrong?”

09:00 - 13:00 AIoTS (3 papers + 2 invited talks)

  • Aditya P. Mathur (SUTD, Singapore)
    “Fusing AI and Design to Protect Critical Infrastructure”

  • Tingting Li (Cardiff University, UK)
    “Trustworthy AI for Securing CPS”