A Formal Treatment of Envelope Encryption |
Shoichi Hirose and Kazuhiko Minematsu |
LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System |
Suryakant Prasad and Y. Sreenivasa Rao |
An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors. |
Mebae Ushida, Takeshi Miyamae, Takeru Fukuoka, Yoshiyuki Sakamaki, Yoshitomo Sakuma, Kota Miyake and Takuya Sakamoto |
Investigation of the Optimal Linear Characteristics of BAKSHEESH |
Yuxuan Peng, Jinpeng Liu and Ling Sun |
Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model |
Hiroaki Anada, Masayuki Fukumitsu and Shingo Hasegawa |
Efficient Privacy-Preserving Counting Method with Homomorphic Encryption |
Jae-yun Kim, Saerom Park, Jieun Yun and Jung Hee Cheon |
CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography |
Duk Young Kim, Kyoungbae Jang, Hyunji Kim, Yujin Oh, Seyoung Yoon and Hwajeong Seo |
Fast Private Set Intersection from Polynomial Multiplication Triples |
Kai Chen, Yongqiang Li, Ya Han and Mingsheng Wang |
LUA-IoT: Let's Usably Authenticate the IoT |
Markus Dahlmanns, Jan Pennekamp, Robin Decker and Klaus Wehrle |
Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications |
Shohei Mita and Kazuki Yoneyama |
Experimental Analysis of the Optimization-based Factorization Algorithm |
Junpei Yamaguchi, Tetsuya Izu and Noboru Kunihiro |
Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities |
Wenwu Xu, Pengyi Wu, Peng Wang, Guoqiao Zhou and Lidong Zhai |
Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods |
Johannes von Richthofen, Christoph Krauß, Johann Altgenug, Dominik Spychalski and Wolfgang Hommel |
Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations |
Jiaming Wen, Willy Susilo, Yanhua Zhang, Fuchun Guo and Huanguo Zhang |
Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights |
Bingqing Li and Ling Sun |
Malicious node identification based on behavioral statistical features and social relationships |
Guangcan Cui, Li-Sheng Huang, Fengjun Zhang, Zuoyuan Niu, Kai Shi and Yunhai Lan |
REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis |
Joonsup Kim, Dongjun Park, Gyusang Kim, Sujin Park, Daehyeon Bae, Heeseok Kim and Seokhie Hong |
RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques |
Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim |
Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs |
Wei-Jen Liao, Tao Ban, Shin-Ming Cheng and Takeshi Takahashi |
Quantum Circuit for Curve25519 with Fewer Qubits |
Gyeongju Song and Hwajeong Seo |
Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation |
Jeewoo Jung and Taekyoung Kwon |
Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS |
Harry Chandra Tanuwidjaja, Tao Ban, Takeshi Takahashi, Tsung-Nan Lin, Boyi Lee and Muhamad Erza Aminanto |
FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism |
Suryakant Prasad and Y. Sreenivasa Rao |