9:30-9:32 Brief welcome
9:32-10:30 Invited talk: Edoardo Persichetti:
Practical Post-Quantum Signatures from the Code Equivalence Problem
10:30-11:00 Coffee Break 1
11:00-13:00 Elena Kirshanova:
Construction-D Lattices from AG codes
Consuelo Martínez and Fabián Molina:
On the Construction of LDOI Group Codes with a Binary Adjacency Matrix
Paulo Almeida, Miguel Beltrá Vidal, and Diego Napp:
Tiny keys for the Convolutional Niederreiter Cryptosystem with GRS Codes
Lars Ran, Simona Samardjiska, and Monika Trimoska:
Algebraic Syndrome Decoding
Freja Elbro and Violetta Weger:
Can we speed up Information Set Decoding by Using Extension Field Structure?
13:00-14:15 Lunch
14:15-15:15 Anuj Kumar Yadav, Manideep Mamindlapally, and Amitalok J. Budkuley:
Leveraging Spherical Codes for Commitment over Gaussian UNCs
Stefan Ritterhoff and Hugo Sauerbier Couvée:
SPARK: Subcode Permutation Argument of Knowledge
15:15-15:45 Coffee Break 2
15:45-17:25 Giuseppe D'Alconzo, Andre Esser, Andrea Gangemi, and Carlo Sanna:
Sneaking up the Ranks: Partial Key Exposure Attacks on Rank-Based Schemes
Alessio Meneghetti and Federica Zanetti:
An algebraic approach for the cryptanalysis of QC-MDPC code-based schemes
Mohamed Malhou, Ludovic Perret and Kristin Lauter:
AI for Code-based Cryptography: A Machine Learning Approach to Code Distinguishability
Anmoal Porwal, Antonia Wachter-Zeh, and Pierre Loidreau:
Improved Key Attack on the MinRank Encryption Scheme on Matrix Codes
9:00-10:30 Invited talk: Violetta Weger:
CROSS: Signature Scheme with Restricted Errors
Vu Nguyen, Thomas Johansson and Qian Guo:
A BKW-Style Solver for the Restricted Decoding Problem
10:30-11:00 Coffee Break 1
11:00-13:00 Veronika Kuchta, Jason LeGrow, and Edoardo Persichetti:
Post-Quantum Blind Signatures from Matrix Code Equivalence
Riccardo Schiavoni, Marco Baldi, Michele Battagliola, Davide De Zuane, Rahmi El Mechri, and Paolo Santini:
SPECK: Signature from Permutation Equivalence of Codes and Kernel
Sebastian Bitzer and Violetta Weger:
VOLEitH-based Signatures from Restricted Decoding Problems
Michele Battagliola, Laura Mattiuz, and Alessio Meneghetti:
VOLEitH signatures based on the linear equivalence problem
Luke Beckwith and Kris Gaj:
Towards Hardware Acceleration of LESS with Canonical Forms
13:00-14:15 Lunch
14:15-15:15 Damla Değirmenci and Oğuz Yayla:
Secure and Efficient Ligero Based Verifiable Delay Function
Julien Juaneda, Marina Dehez-Clementi, Jérôme Lacan, and Jean-Christophe Deneuville:
RHQC: post-quantum ratcheted key exchange from coding assumptions
15:15-15:45 Coffee Break 2
15:45-17:00 Michael Schaller:
A Lattice Approach to the BIKE Cryptosystem
Felicitas Hörmann and Anna-Lena Horlemann:
Skew Reed-Solomon codes to the ReSkew: a new code-based cryptosystem
José Gómez Torrecillas, F. J. Lobillo, and Gabriel Navarro:
A knapsack McEliece-based public key cryptosystem