Abstract is missing.
- Exploring the Optimal Differential Characteristics of SM4 - Improving Automatic Search by Including Human InsightsBingqing Li, Ling Sun. 3-17 [doi]
- Investigation of the Optimal Linear Characteristics of BAKSHEESHYuxuan Peng, Jinpeng Liu, Ling Sun. 18-32 [doi]
- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient InstantiationsJiaming Wen 0001, Willy Susilo, Yanhua Zhang, Fuchun Guo, Huanguo Zhang. 35-55 [doi]
- Tightly Secure Lattice-Based Synchronized Aggregate Signature in Standard ModelHiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa. 56-70 [doi]
- FineDReaM: A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval MechanismSuryakant Prasad, Y. Sreenivasa Rao. 73-95 [doi]
- A Formal Treatment of Envelope EncryptionShoichi Hirose, Kazuhiko Minematsu. 96-110 [doi]
- Efficient Privacy-Preserving Counting Method with Homomorphic EncryptionJae Yun Kim, Jieun Yun, Jung Hee Cheon, Saerom Park. 111-137 [doi]
- Experimental Analysis of the Optimization-Based Factorization AlgorithmJunpei Yamaguchi, Tetsuya Izu, Noboru Kunihiro. 138-154 [doi]
- Fast Private Set Intersection from Polynomial Multiplication TriplesKai Chen, Yongqiang Li 0001, Ya Han, Mingsheng Wang. 155-180 [doi]
- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific MutationJeewoo Jung, Taekyoung Kwon 0002. 181-205 [doi]
- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring TechniquesRini Wisnu Wardhani, Dedy Septono Catur Putranto, Howon Kim 0001. 209-230 [doi]
- Quantum Circuit for Curve25519 with Fewer QubitsGyeongju Song, Hwajeong Seo. 231-243 [doi]
- CS-Net: A Deep Learning-Based Analysis for the Cryptography and SteganographyDukyoung Kim, Kyoungbae Jang, HyunJi Kim, Yujin Oh, Seyoung Yoon, Hwajeong Seo. 244-257 [doi]
- REAF: Replacing Exponential Activation Function to Prevent Side-Channel AnalysisJoonsup Kim, Dongjun Park, GyuSang Kim, Sujin Park, Daehyeon Bae, Heeseok Kim, Seokhie Hong. 261-284 [doi]
- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation MethodsJohannes von Richthofen, Christoph Krauß, Johann Altgenug, Dominik Spychalski, Wolfgang Hommel. 285-310 [doi]
- Simultaneous Multiplication Protocol Based on Packed Linear Secret Sharing and Its ApplicationsShohei Mita, Kazuki Yoneyama. 313-328 [doi]
- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call GraphsWei-Jen Liao, Tao Ban, Shin-Ming Cheng, Takeshi Takahashi 0001. 329-343 [doi]
- LUA-IoT: Let's Usably Authenticate the IoTMarkus Dahlmanns, Jan Pennekamp, Robin Decker, Klaus Wehrle. 344-378 [doi]
- An Information-Sharing System that Guarantees the Authenticity and Privacy of ContributorsMebae Ushida, Takeshi Miyamae, Takeru Fukuoka, Yoshiyuki Sakamaki, Yoshitomo Sakuma, Kota Miyake, Takuya Sakamoto. 379-400 [doi]
- Malicious Node Identification Based on Behavioral Statistical Features and Social RelationshipsGuangcan Cui, Lisheng Huang, Fengjun Zhang, Zuoyuan Niu, Kai Shi, Yunhai Lan. 401-422 [doi]
- +: An Improved Lightweight Sharable and Traceable Secure Mobile Health SystemSuryakant Prasad, Y. Sreenivasa Rao. 423-440 [doi]
- Pre-trained Language Models for Alert Aggregation: Limitations and OpportunitiesWenwu Xu, Pengyi Wu, Peng Wang, Guoqiao Zhou, Lidong Zhai. 443-464 [doi]
- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDSHarry Chandra Tanuwidjaja, Tao Ban, Takeshi Takahashi 0001, Tsung-Nan Lin, Boyi Lee, Muhamad Erza Aminanto. 465-486 [doi]