Abstract is missing.
- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-trainingYuwei Xu, Zhengxin Xu, Jie Cao 0009, Rongrong Wang, Yali Yuan, Guang Cheng 0001. 3-23 [doi]
- Two-Round Post-quantum Private Equality Test and OT from RLWE-EncryptionShengzhe Meng, Chengrui Dang, Bei Liang, Jintai Ding. 24-42 [doi]
- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted FuzzingIaroslav Gridin, Antonis Michalas. 43-62 [doi]
- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater DetectionYong Li 0002, Yueyang Feng, Xi Chen 0063, Jian Zhang, Ruxian Li, Kewei Lv, Dawei Zhang. 63-83 [doi]
- X-Cipher: Achieving Data Resiliency in Homomorphic CiphertextsAdam Caulfield, Nabiha Raza, Peizhao Hu. 87-106 [doi]
- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted FunctionsYan Xu, Li-Ping Wang, Huaxiong Wang. 107-127 [doi]
- Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGMHao Huang, Xiaofen Wang, Ke Zhang, Man Ho Au, Sheng Cao, Qinglin Zhao, Xiaosong Zhang 0001. 128-148 [doi]
- CoDPoC IP: A Configurable Data Protection Circuit to Support Multiple Key Agreement SchemeYijing Peng, Junhui Wang, Zhenyu Wang, Zhenbin Guo, Yaohua Wang, Ding Deng, Shaoqing Li, Yang Guo 0003. 151-170 [doi]
- Formal Analysis of Julia Key Agreement ProtocolNavya Sivaraman, Simin Nadjm-Tehrani, Thomas Johansson 0001. 171-190 [doi]
- New Construction of Code-Based Signature SchemesYang Yang, Fangguo Zhang. 191-210 [doi]
- Identity-Based Signature from Lattices Without TrapdoorsPingbin Luo, Xinjian Chen 0004, Willy Susilo, Qiong Huang 0001. 211-230 [doi]
- The Emperor is Now Clothed: A Secure Governance Framework for Web User Authentication Through Password ManagersAli Cherry, Konstantinos Barmpis, Siamak F. Shahandashti. 233-252 [doi]
- HoneyLLM: A Large Language Model-Powered Medium-Interaction HoneypotWenjun Fan, Zichen Yang, Yuanzhen Liu, Lang Qin, Jia Liu. 253-272 [doi]
- TSR-Jack: An In-Browser Crypto-Jacking Detection Method Based on Time Series Representation LearningBo Cui, Shuai Liu. 273-288 [doi]
- Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational DatabasesKe Yang, Shuguang Yuan, Jing Yu, Yuyang Wang, Tengfei Yang, Chi Chen. 289-309 [doi]
- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hostingMingfeng Xin, Hui-Wen, Liting Deng, Hong Li 0004, Qiang Li 0007, Limin Sun 0001. 310-331 [doi]