Abstract is missing.
- CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) AssumptionsToi Tomita, Wakaha Ogata, Kaoru Kurosawa. 3-22 [doi]
- (Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two PointsHiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi. 23-33 [doi]
- An Efficient F_4 -style Based Algorithm to Solve MQ ProblemsTakuma Ito, Naoyuki Shinohara, Shigenori Uchiyama. 37-52 [doi]
- How to Solve Multiple Short-Exponent Discrete Logarithm ProblemKaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Yusuke Sakagami. 53-64 [doi]
- Secure Multiparty Matrix Multiplication Based on Strassen-Winograd AlgorithmJean-Guillaume Dumas, Pascal Lafourcade 0001, Julio López Fenner, David Lucas, Jean-Baptiste Orfila, Clément Pernet, Maxime Puys. 67-88 [doi]
- An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with NegationsRyo Okishima, Toru Nakanishi 0001. 89-106 [doi]
- More Results on Shortest Linear ProgramsSubhadeep Banik, Yuki Funabiki, Takanori Isobe. 109-128 [doi]
- Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel StructureKosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe. 129-145 [doi]
- Correlating High- and Low-Level Features: - Increased Understanding of Malware ClassificationSergii Banin, Geir Olav Dyrkolbotn. 149-167 [doi]
- Towards Efficient Detection of Malicious VBA Macros with LSIMamoru Mimura, Taro Ohminami. 168-185 [doi]
- IDS Alert Priority Determination Based on Traffic BehaviorShohei Hiruta, Satoshi Ikeda, Shigeyoshi Shima, Hiroki Takakura. 189-206 [doi]
- (Short Paper) Effectiveness of Entropy-Based Features in High- and Low-Intensity DDoS Attacks DetectionAbigail Koay, Ian Welch, Winston K. G. Seah. 207-217 [doi]
- API Usability of Stateful Signature SchemesAlexander Zeier, Alexander Wiesmaier, Andreas Heinemann. 221-240 [doi]
- (Short Paper) Method for Preventing Suspicious Web Access in Android WebViewMasaya Sato, Yuta Imamura, Rintaro Orito, Toshihiro Yamauchi. 241-250 [doi]
- Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security NotionsJunichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura. 253-272 [doi]
- Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)Xin Wang, Shimin Li, Rui Xue. 273-283 [doi]
- Finding Ordinary Cube Variables for Keccak-MAC with Greedy AlgorithmFukang Liu, Zhenfu Cao, Gaoli Wang. 287-305 [doi]
- Preimage Attacks on Reduced Troika with Divide-and-Conquer MethodsFukang Liu, Takanori Isobe. 306-326 [doi]
- VSS Made SimplerYvo Desmedt, Kirill Morozov. 329-342 [doi]
- Bidirectional Asynchronous Ratcheted Key Agreement with Linear ComplexityF. Betül Durak, Serge Vaudenay. 343-362 [doi]
- A New Approach to Constructing Digital Signature Schemes - (Short Paper)Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu. 363-373 [doi]
- GRYPHON: Drone Forensics in Dataflash and Telemetry LogsEvangelos Mantas, Constantinos Patsakis. 377-390 [doi]
- Toward the Analysis of Distributed Code Injection in Post-mortem ForensicsYuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Jacob Faires, Terrence Lillard. 391-409 [doi]