Accepted Papers

First Submission

  • Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions
    Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida
    (Ibaraki University; University of Tsukuba; National Institute of Advanced Industrial Science and Technology; Kyushu University)

  • An Extended Rectangular MinRank Attack against UOV and Its Variants
    Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama
    (Tokyo Metropolitan University; NTT Social Informatics Laboratories; National Institute of Information and Communications Technology; Ibaraki University)

  • Dynamic Collusion Function-Private Functional Encryption
    Dingding Jia
    (State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)

  • Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect
    Haruka Nakajima Suzuki and Midori Inaba
    (Institute of Information Security, Yokohama)

  • Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis
    Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki
    (Institute of Information Security, Yokohama; Kagawa University)

  • Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns
    Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song
    (State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)

  • Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption
    Masayuki Tezuka and Keisuke Tanaka
    (Institute of Science Tokyo)

  • Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor
    Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki
    (Institute of Information Security, Yokohama; University of Tokyo)

Second Submission

  • Non-Interactive Privacy-Preserving Record Linkage using Polynomial Sparsity Testing
    Frederik Armknecht, Youzhe Heng and Jochen Schäfer
    (University of Mannheim)

  • Public Key Encryption with Equality Test from Tag-Based Encryption
    Masayuki Tezuka and Keisuke Tanaka
    (Institute of Science Tokyo)

  • Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction
    Koji Nuida
    (Kyushu University / National Institute of Advanced Industrial Science and Technology)

  • Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding
    Shintaro Narisada, Hiroki Okada, Yusuke Aikawa and Kazuhide Fukushima
    (KDDI Research; The University of Tokyo)

  • Cyber Threat Intelligence Report Summarization with Named Entity Recognition
    Tomoaki Mimoto, Kentaro Kita, Yuta Gempei, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka
    (KDDI Research; University of Hyogo)

  • Multi-Designated Verifier Ring Signature: Generic Construction from Standard Primitives
    Yuuki Fujita, Keisuke Hara, Keitaro Hashimoto and Kyosuke Yamashita
    (Osaka University; National Institute of Advanced Industrial Science and Technology; Yokohama National University)

  • Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies
    Yonghwa Lee, Wonseok Choi and Donghyun Nam
    (Theori Inc.; Korea University; Inha University)

  • Blockchain-based Economic Voting with Posterior Security from Lattices
    Navid Abapour, Amir Kafshdar Goharshady, Constantin Catalin Dragan and Mahdi Mahdavi
    (University of Surrey; University of Oxford; Universitat Oberta de Catalunya)

  • Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated Differential Privacy
    Takumasa Ishioka and Masayuki Terada
    (Kyoto Tachibana University)

  • Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata
    Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge and Junaid Haseeb
    (The University of Waikato)

  • Accelerating Simulations of Bitvector-Based LDP Protocols via Binomial Modeling
    Yusuf Cemal Karatas and M. Emre Gursoy
    (Koç University)

  • Minimum number of up-down cards for finite-time committed-AND protocol without interlocking operations
    Atsushi Iwasaki
    (Saga University)

  • Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code Analysis
    Kentaro Kita, Yuta Gempei, Tomoaki Mimoto, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka
    (KDDI Research; University of Hyogo)

  • Evaluation of Adversarial Input Attacks in Retrieval-Augmented Generation Using Large Language Models
    Kento Hasegawa, Seira Hidano and Kazuhide Fukushima
    (KDDI Research)

  • Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree-Based Classification
    Franziska Zimmer, Mhd Irvan, Maharage Nisansala Sevwandi Perera, Ryosuke Kobayashi and Rie Shigetomi Yamaguchi
    (The University of Tokyo)

  • One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK
    Christian Müller, Vasily Mikhalev, Yves T. Staudenmaier and Frederik Armknecht
    (University of Mannheim)

  • Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?
    Max Cartor, Mark Lewis, Jacob Lichtinger, Ray Perlner and Daniel Smith-Tone
    (Bellarmine University; University of Louisville; National Institute of Standards and Technology)

  • Cryptanalysis of the best HFE-LL' Constructions
    Daniel Smith-Tone and Cristian Valenzuela
    (National Institute of Standards and Technology; University of Louisville)

  • Approximate CRT-Based Gadget Decomposition for Fully Homomorphic Encryption
    Olivier Bernard and Marc Joye
    (Zama)