Accepted Papers

First Submission

  • Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions
    Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida
    (Ibaraki University; University of Tsukuba; National Institute of Advanced Industrial Science and Technology; Kyushu University)

  • An Extended Rectangular MinRank Attack against UOV and Its Variants
    Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama
    (Tokyo Metropolitan University; NTT Social Informatics Laboratories; National Institute of Information and Communications Technology; Ibaraki University)

  • Dynamic Collusion Function-Private Functional Encryption
    Dingding Jia
    (State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)

  • Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect
    Haruka Nakajima Suzuki and Midori Inaba
    (Institute of Information Security, Yokohama)

  • Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis
    Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki
    (Institute of Information Security, Yokohama; Kanagawa University)

  • Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns
    Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song
    (State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)

  • Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption
    Masayuki Tezuka and Keisuke Tanaka
    (Institute of Science Tokyo)

  • Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor
    Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki
    (Institute of Information Security, Yokohama; University of Tokyo)