6th ACNS Workshop on Secure Cryptographic Implementation

June 23-26, 2025, Munich, Germany

© München Tourismus, Thomas Klinger



In recent years, we have witnessed severe security incidences caused by buggy protocols or implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, Windows Curveball certificate validation vulnerability, PDF shadow attacks, Google Titan Token Bluetooth bug, Samsung Galaxy IV reuse, vulnerable DUHK RNG, etc. It is critical for practitioners and researchers to ensure the security of cryptographic software and hardware, which are essential for a wide range of systems, services, and applications.


IMPORTANT UPDATE: The 6th ACNS-SCI workshop will be held in June 25th, in conjunction with the 23rd International Conference on Applied Cryptography and Network Security (ACNS 2025) in Munich, Germany.



Chairs


Program

09:00–09:10: Opening Remark - Jingqiang Lin

09:10–10:10: Keynote: How the Microarchitecture Undermines Confidentiality and Integrity, Daniel Gruss (Session Chair - Jingqiang Lin, University of Science and Technology of China)

10:10–10:30: Session I: Implementation of Hybrid Homomorphic Encryption (Session Chair - Wei Wang, University of Science and Technology of China)

  • Improved Functional Bootstrapping of SM4 for Hybrid Homomorphic Encryption, Jin Peng, Dachao Wang and Zheng Gong
  • 10:30–11:10: Break

    11:10–12:30: Session II: Side-Channel Attacks (Session Chair - Yangguang Tian, University of Surrey)

  • ChatGPT as Preprocessing Agents: A Case Study on Cryptographic Side-Channel Analysis, Zhen Li, Anjiang Liu, An Wang and Weijia Wang
  • Improved PACD-based Attacks on RSA-CRT, Guillaume Barbu, Laurent Grémy and Roch Lescuyer
  • Differential Fault Analysis against White-box SM4 Implementations, Liangju Zhao, Luoqi Chen, Yufeng Tang and Zheng Gong
  • One Time is Enough: Chosen-Ciphertext Side-Channel Attack on ML-KEM Cryptosystems, Yuhan Qian, Jing Gao, Yuchen Zhong, Yaoling Ding, Jingjie Wu, Weiping Gong, Zihe Lin and An Wang
  • 12:30–14:00: Break

    14:00–15:00: Session III: Implementation of Post-Quantum Cryptography (Session Chair - Wei Wang, University of Science and Technology of China)

  • Stateless Hash-Based Signatures for Post-Quantum Security Keys, Ruben Gonzalez
  • PQMagic: Towards Secure and Efficient Post Quantum Cryptography Implementations, Yituo He, Xinpeng Hao, Juanru Li and Yu Yu
  • Leveled Software Implementation of Polka and Comparison with Uniformly Masked Kyber, Thibaud Schoenauen, Clément Hoffmann, Charles Momin, Thomas Peters and Francois-Xavier Standaert
  • 15:00–15:40: Session IV: Security Analysis of Post-Quantum Cryptography (Session Chair - Zengpeng Li, Shandong University)

  • A Review of Lattice Cryptography Attack Cost Model, Xi Hu, Yunfei Cao and Hong Xiang
  • Research on the Security Estimation Framework for Code-Based Public Key Cryptography Algorithms, Haoyue Fu, Yunfei Cao, Hong Xiang and Congyi Zhang
  • 15:40–16:00: Break

    16:00–17:00: Session V: Applied Cryptography in the Real World (Session Chair - Jia Zhang, Tsinghua University)

  • RCE-HVE: Plausible Deniability against Multi-Snapshot Adversaries with Amplified Storage, Haoyang Xing, Chongyu Long, Anda Che, Fangyu Zheng and Jiwu Jing
  • Exploring the HTTPS OCSP Ecosystem: A Comprehensive Study, Hengsheng Wang, Shushang Wen and Wei Wang
  • Paper Document Anti-counterfeiting System based on Digital Signatures and Image Processing, Yiyan Zhao, Jiwu Jing, Junlin He and Fangyu Zheng

  • Keynote

    Daniel Gruss

    Professor Daniel Gruss,
    Graz University of Technology

    Title: How the Microarchitecture undermines Confidentiality and Integrity

    Abstract: In this talk we will discuss a range of microarchitectural attacks. We will see that the microarchitecture is a common source of information leakage, with the example of different side channel attacks, transient-execution attacks, and even architectural leakage due to bugs in the processor implementation. We then show that integrity can also be compromised both due to physical effects and due to implementation bugs.

    Bio: Daniel Gruss is a Professor at Graz University of Technology. He has been teaching undergraduate courses since 2010. Daniel's research focuses on side channels and transient execution attacks. He implemented the first remote fault attack running in a website, known as Rowhammer.js. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018. He frequently speaks at top international venues. In 2022, he received a prestigious ERC StG Grant to research the foundations of sustainable security.


    Accepted Papers

    1. Improved PACD-based Attacks on RSA-CRT. Guillaume Barbu, Laurent Grémy and Roch Lescuyer
    2. One Time is Enough: Chosen-Ciphertext Side-Channel Attack on ML-KEM Cryptosystems. Yuhan Qian, Jing Gao, Yuchen Zhong, Yaoling Ding, Jingjie Wu, Weiping Gong, Zihe Lin and An Wang
    3. A Review of Lattice Cryptography Attack Cost Model. Xi Hu, Yunfei Cao and Hong Xiang
    4. Exploring the HTTPS OCSP Ecosystem: A Comprehensive Study. Hengsheng Wang, Shushang Wen and Wei Wang
    5. Differential Fault Analysis against White-box SM4 Implementations. Liangju Zhao, Luoqi Chen, Yufeng Tang and Zheng Gong
    6. Leveled Software Implementation of Polka and Comparison with Uniformly Masked Kyber. Thibaud Schoenauen, Clément Hoffmann, Charles Momin, Thomas Peters and Francois-Xavier Standaert
    7. Research on the Security Estimation Framework for Code-Based Public Key Cryptography Algorithms. Haoyue Fu, Yunfei Cao, Hong Xiang and Congyi Zhang
    8. Paper Document Anti-counterfeiting System based on Digital Signatures and Image Processing. Yiyan Zhao, Jiwu Jing, Junlin He and Fangyu Zheng
    9. PQMagic: Towards Secure and Efficient Post Quantum Cryptography Implementations. Yituo He, Xinpeng Hao, Juanru Li and Yu Yu
    10. Stateless Hash-Based Signatures for Post-Quantum Security Keys. Ruben Gonzalez
    11. ChatGPT as Preprocessing Agents: A Case Study on Cryptographic Side-Channel Analysis. Zhen Li, Anjiang Liu, An Wang and Weijia Wang
    12. Improved Functional Bootstrapping of SM4 for Hybrid Homomorphic Encryption. Jin Peng, Dachao Wang and Zheng Gong
    13. RCE-HVE: Plausible Deniability against Multi-Snapshot Adversaries with Amplified Storage. Haoyang Xing, Chongyu Long, Anda Che, Fangyu Zheng and Jiwu Jing

    Call for papers


    The aim of the SCI workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic solutions. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (4) weak cryptographic keys and random numbers in the cryptographic implementation; (5) runtime cryptographic key attacks and protections; (6) certificates and key management; (7) misuse or abuse of cryptographic services; and (8) other topics on secure cryptographic implementations.


    We try to promote secure cryptographic solutions in the Internet, by exploring and discussing the (in)security issues. We solicit submissions of original research papers on a wide range of topics, including but not limited to:



    We are especially interested in papers with novel ideas, position papers, pilot studies, and initial findings. An ACNS workshop best paper award will be selected from the accepted papers of all workshops. Meanwhile, the workshop will include an interesting keynote talk, which will be announced on the workshop web site as arrangements are finalized.


    Prospective authors are invited to submit manuscripts describing original work. The manuscript has to be written in English and in PDF format. All submissions must follow the original LNCS format (accessible on the Springer LCNS author guidelines webpage) with a page limit of 20 pages including all references and appendices.


    The post-proceedings of the SCI workshop will be published by Springer in the LNCS series.


    Submit your papers: https://easychair.org/conferences/?conf=acnssci2025




    Important Dates


    Paper submission deadline

    March 15 March 22, 2025, 23:59, AoE (EXTENDED)

    Acceptance Notification

    April 20, 2025

    Camera Ready

    May 12, 2025

    Program Committee

  • Florian Caullery HENSOLDT Cyber GmbH, Germany
  • Bo Chen Michigan Technological University, USA
  • Yikang Chen The Chinese University of Hong Kong, China
  • Jiankuo Dong Nanjing University of Posts and Telecommunications, China
  • Haixin Duan Tsinghua University, China
  • Shanqing Guo Shandong University, China
  • Honggang Hu University of Science and Technology of China, China
  • Shijie Jia Chinese Academy of Sciences, China
  • Rongxing Lu Queen's University, Canada
  • Bingyu Li Beihang University, China
  • Fengjun Li University of Kansas, USA
  • Chunli Lv China Agricultural University, China
  • Kui Ren Zhejiang University, China
  • Jun Shao Zhejiang Gongshang University, China
  • Ruisheng Shi Beijing University of Posts and Telecommunications, China
  • Shifeng Sun Shanghai Jiao Tong University, China
  • Qiang Tang The University of Sydney, Australia
  • An Wang Beijing Institute of Technology, China
  • Ding Wang Nankai University, China
  • Juan Wang Wuhan University, China
  • Bowen Xu Ningbo University, China
  • Fangyu Zheng Chinese Academy of Sciences, China
  • Cong Zuo Beijing Institute of Technology, China