Abstract is missing.
- Many-Time Linkable Ring SignaturesNam Tran, Khoa Nguyen 0002, Dongxi Liu, Josef Pieprzyk, Willy Susilo. 3-22 [doi]
- Claimable Multi-designated Verifier SignatureYuuki Fujita, Keisuke Hara, Kyosuke Yamashita. 23-43 [doi]
- Logarithmic-Size Ring Signatures with Tight Security from the DL AssumptionKeisuke Hara, Masayuki Tezuka. 44-64 [doi]
- Registered Attribute-Based Signature with Attribute PrivacyLiuyu Yang, Xinxuan Zhang, Yi Deng, Xudong Zhu, Zhuo Wu, Zhongliang Zhang. 65-87 [doi]
- Electrum: UC Fail-Stop Server-Supported SignaturesNikita Snetkov, Jelizaveta Vakarjuk, Peeter Laud. 88-107 [doi]
- Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFsXinyu Zhang 0017, Qishuang Fu, Ron Steinfeld, Joseph K. Liu, Tsz Hon Yuen, Man Ho Au. 111-129 [doi]
- A NTRU Lattice Based Linkable DualRing SignatureHonghui Ye, Xinjian Chen, Qiong Huang. 130-149 [doi]
- Optimized Implementation of NTRU on RISC-V PlatformWen Zhang, Lu Zhou, Hao Yang, Zhe Liu. 150-165 [doi]
- Proposal of An SVP Solver on Prime Cyclotomic LatticesKazutaka Toda, Yuntao Wang 0002. 166-182 [doi]
- AdvPurge: A Robust Personalized Federated Learning Framework Against Backdoor AttackTu Huang, Na Ruan. 185-201 [doi]
- Federated Intrusion Detection Under Non-IID TrafficZiang Wu, Xiuheng Liao, Buzhen He, Shuai Shang, Tianhui Li, Chunhua Su. 202-217 [doi]
- Dynamic Self-feedback Mechanism for Improved Privacy Budgeting in LDP-SGDBingchang He, Atsuko Miyaji. 218-234 [doi]
- A Deep Reinforcement Learning Framework for Robust Maritime Collision Avoidance Under GPS SpoofingYing Ding, Weizhi Meng, Shaoming He, Wenjuan Li. 235-254 [doi]
- Network Intrusion Detection System Based on Reinforcement Learning Technique OptimizationSukkarin Ruensukont, Karin Sumonkayothin, Prarinya Siritanawan, Narit Hnoohom, Setthawhut Saennam, Razvan Beuran. 255-276 [doi]
- A Round-Optimal Near-Linear Third-Party Private Set Intersection ProtocolFoo Yee Yeo, Jason H. M. Ying. 279-298 [doi]
- An Attack to Universally Composable Commitments from Malicious Physically Uncloneable Functions and How to Avoid ItLourenço Abecasis, Paulo Mateus, Chrysoula Vlachou. 299-326 [doi]
- More Practical Non-interactive Encrypted Conjunctive Search with Leakage and Storage SuppressionHuu Ngoc Duc Nguyen, Shujie Cui, Shangqi Lai, Tsz Hon Yuen, Joseph K. Liu. 329-349 [doi]
- Lattice-Based Certificateless Encryption with Keyword SearchMinghui He, ZeSheng Lin, Hongbo Li, Xinjian Chen, Qiong Huang. 350-367 [doi]
- SEARCHAIN: Searchable Encryption As Rewarded-Useful-Work on BlockchainJun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo, Hui Cui 0001. 368-384 [doi]
- DHABI FRAMEWORK: A Hybrid Approach to Overcoming Resistance Against Statistical Cryptanalysis and Side-Channel AnalysisSumesh Manjunath Ramesh, Hoda AlKhzaimi. 387-406 [doi]
- AccountCatcher: Anomaly Blockchain Account Detection Based on Hybrid Graph-Based ModelWenkuan Xiao, Qianhong Wu, Wenbo Wu, Sipeng Xie, Bo Qin. 409-425 [doi]
- GenDetect: Generative Large Language Model Usage in Smart Contract Vulnerability DetectionPeter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du 0001, Xiapu Luo. 426-445 [doi]
- Source Code Guardrail: AI Driven Solution to Distinguish Critical vs. Generic Code for Enterprise LLM SecurityRaghav Sharma, Amit Gupta. 449-458 [doi]
- An Empirical Study of Variation of Blockchain to Address the Issue of Verification and ValidationJoya Biswas, Rutaban Jania, Jahid Hossain, Mohammad Farhan Ferdous, Shakik Mahmud, Jiageng Chen, Rashed Mazumder. 459-469 [doi]
- Improved Constant-Time Modular InversionShogo Kuramoto, Atsuko Miyaji. 470-480 [doi]
- POSTER: Tricking LLM-Based NPCs into Spilling SecretsKyohei Shiomi, Zhuotao Lian, Toru Nakanishi 0001, Teruaki Kitasuka. 483-487 [doi]
- Privacy-Preserving LLM Agent for Multi-modal Health MonitoringQipeng Xie, Jiafei Wu, Weiyu Wang, Zhuotao Lian, Mu Yuan, Xian Shuai, Weizheng Wang 0001, Yuan Haoyi, Haibo Hu, Kaishun Wu. 488-492 [doi]
- POSTER: AI-Based Physical Layer Key Generation MechanismHong Zhao, Zhuotao Lian, Xinsheng Wang, Enting Guo. 493-497 [doi]
- POSTER: A Server-Side Proactive Defense Framework for Poison-Resilient Federated LearningQingkui Zeng, Zhuotao Lian. 498-502 [doi]
- POSTER: An Efficient Sieve Algorithm for Ideal LatticesYuntao Wang 0002, Kazutaka Toda. 503-507 [doi]