Abstract is missing.
- Insider Collusion Attack on Distributed Machine Learning System and its Solutions - A Case of SVMPeter Shaojui Wang. 1 [doi]
- Six-Card Finite-Runtime XOR Protocol with Only Random CutKodai Toyoda, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone. 2-8 [doi]
- Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map AccumulatorToru Nakanishi, Hiromi Yoshino, Tomoki Murakami, Guru-Vamsi Policharla. 9-18 [doi]
- Verification of Group Key Management of IEEE 802.21 using ProVerifRyoga Noguchi, Yoshikazu Hanatani, Kazuki Yoneyama. 19-27 [doi]
- Cryptanalysis of GiophantusTM Schemes against Hybrid AttackYuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi. 28-35 [doi]
- Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding ProblemYasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama. 36-44 [doi]
- Exploiting Decryption Failures in Mersenne Number CryptosystemsMarcel Tiepelt, Jan-Pieter D'Anvers. 45-54 [doi]