
Home | Resources | Conference 2024 | Join the community
Home — Register — Program — Call for presentations — Committees — Submissions — Contact — Sponsor — Resources
| Time | Session Topic | Presenters/Authors/Description |
|---|---|---|
| 8:30 AM | Registration & Morning Refreshments 🥐 | |
| 9:00 AM | Welcome and Opening Remarks | Mariya Georgieva Belorgey and Yarkin Doroz |
| 9:05 AM | Invited Tutorials: Tools for FHE Applications | Session Chair: Mariya Georgieva Belorgey |
| 9:05 AM | Privacy-Preserving Functional Database Exploration with Lattigo | Jean-Philippe Bossuat |
| 9:30 AM | An SQL-based Data Analysis Platform using Homomorphic Encryption | Donghoon Yoo and Joohyung Lee |
| 9:55 AM | The HEIR Compiler | Jeremy Kun and Asra Ali |
| 10:20 AM | Morning Break ☕️ | |
| 10:45 AM | Session I: Contributed Talks | Session Chair: Prof. Ingrid Verbauwhede |
| 10:45 AM | Designs for Practical Somewhat Homomorphic Encryption Schemes Based on Ring-LWR | Madalina Bolboceanu, Anamaria Costache, Erin Hales, Rachel Player, Miruna Rosca, and Radu Titiu |
| 11:10 AM | Large Domain Homomorphic Evaluation in Levelled Mode | Jean-Philippe Bossuat and Malika Izabachène |
| 11:35 AM | Revisiting Key Decomposition Techniques for FHE: Simpler, Faster and More Generic | Mariya Georgieva Belorgey, Sergiu Carpov, Nicolas Gama, Sandra Guasch, and Dimitar Jetchev |
| 12:00 PM | BASALISC: Programmable Hardware Accelerator for BGV and CKKS FHE - An Interim Design Update | David Archer, Robin Geelen, and Michiel Van Beirendonck |
| 12:30 PM | Buffet Lunch and Poster Presentations/Discussions 🍴 | |
| 1:30 PM | Session II: Contributed Talks | Session Chair: Prof. Daniele Micciancio |
| 1:30 PM | On Circuit Private, Multikey and Threshold Approximate Homomorphic Encryption | Kamil Kluczniak and Giacomo Santato |
| 1:55 PM | Plug-and-play Sanitization for TFHE | Florian Bourse and Malika Izabachène |
| 2:20 PM | A Practical Framework for Verifiable Computation over Encrypted Data | Diego F. Aranha, Anamaria Costache, Antonio Guimarães, and Eduardo Soria-Vazquez |
| 2:45 PM | Security Guidelines for Implementing Homomorphic Encryption | Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, and Bahattin Yildiz |
| 3:15 PM | Afternoon Break 🧃 | |
| 3:45 PM | Session III: Contributed Talks | Session Chair: Prof. Nigel Smart |
| 3:45 PM | TFHE Simplified: A Practical Guide to Integer Arithmetic and Reliability | Ilaria Chillotti, Sarah El Kazdadi, Damien Ligier, Arthur Meyre, Thomas Montaigu, Jean-Baptiste Orfila, and Samuel Tap |
| 4:10 PM | AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE | Wei Ao and Vishnu Naresh Boddeti |
| 4:35 PM | Revisiting Oblivious Top-k Selection with Applications to Secure k-NN Classification | Kelong Cong, Robin Geelen, Jiayi Kang, and Jeongeun Park |
| 5:05 PM | Short Break 🍵 | |
| 5:15 PM | Invited Talk | Session Chair: Yarkin Doroz |
| 5:15 PM | Estimating the Difficulty of Breaking Lattice-Based Cryptography | Prof. Martin Albrecht (Kings College London, Sandbox AQ) |
| 6:00 PM | Closing Remarks | Mariya Georgieva Belorgey and Yarkin Doroz |
| 6:15 PM | After Party 🍻 |
| Poster | Presenters |
|---|---|
| At Last! A Homomorphic AES Evaluation in Less than 30 Seconds by Means of TFHE | Aymen Boudguiga, Daphné Trama, Pierre-Emmanuel Clet, and Renaud Sirdey |
| Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings | Andrea Di Giusto and Chiara Marcolla. |
| Convolution-friendly Image Compression in FHE | Axel Mertens, Georgio Nicolas, and Sergi Rovira |
| Edit distance in the encrypted domain | Ingrid Verbauwhede, Jan-Pieter D'Anvers, and Wouter Legiest |
| Faster Parameter Selection for FHE | Chiara Marcolla, Elena Kirshanova, and Sergi Rovira |
| Game of Life, Revisited | Benoit Chevallier-Mames and Umut Şahin |
| Hardware-Accelerated Encrypted Credit Card Fraud Check | Florent Michel, Jakub Ziarno, Joseph Wilson, Nicholas New, Shuhao Yang, Thanh-Huyen Nguyen, and Victor Lisinski |
| Homomorphic Integer Division for TFHE | Amit Deo, Marc Joye, and Olivier Bernard |
| Liberate.FHE: A New FHE Library for Bridging the Gap between Theory and Practice with a Focus on Performance and Accuracy | Donghoon Yoo, Hanyul Ryu, and Juwhan Kim |
| Low Latency Evaluation of AES via (leveled) TFHE | Benqiang Wei, Kunpeng Wang, Ruida Wang, Xianhui Lu, and Zhihao Li |
| Making FHE hardware-acceleration-friendly (and vice versa) | Furkan Turan, Ingrid Verbauwhede, Jan-Pieter D'Anvers, and Michiel Van Beirendonck |
| Multi-Objective Arithmetization and Composition of Common Primitives for Homomorphic Encryption | Jelle Vos, Mauro Conti, and Zekeriya Erkin |
| Neural Network Training on Encrypted Data with TFHE | Andrei Stoian, Celia Kherfallah, Jordan Frery, Luis Montero, and Roman Bredehoft |
| Novel uses cases enabled by FHE in Blockchain | Remi Gai |
| Optimized Homomorphic Evaluation of Boolean Functions and Concrete Application on Cryptographic Primitives | David Pointcheval, Matthieu Rivain, Nicolas Bon, and Sonia Belaïd |
| Robust FHE in Practice | Alexander Viand, Anwar Hithnawi, and Christian Knabenhans |
| The Inhibitor: ReLU and Addition-Based Attention for Efficient Transformers under Fully Homomorphic Encryption on the Torus | Andrei Stoian and Rickard Brännvall |
| Towards Practical FHE Calculations Integrity by Means of Rinocchio | Caroline Fontaine, Marc Renard, Oana Stan, and Renaud Sirdey |
| Towards Verifiable Bootstrapping in Practice - Proving Correct Execution of TFHE’s Blind Rotation using plonky2 | Louis Tremblay Thibault and Michael Walter |