Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions
Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida (Ibaraki University; University of Tsukuba; National Institute of Advanced Industrial Science and Technology; Kyushu University)
An Extended Rectangular MinRank Attack against UOV and Its Variants
Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama (Tokyo Metropolitan University; NTT Social Informatics Laboratories; National Institute of Information and Communications Technology; Ibaraki University)
Dynamic Collusion Function-Private Functional Encryption
Dingding Jia (State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)
Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect
Haruka Nakajima Suzuki and Midori Inaba (Institute of Information Security, Yokohama)
Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis
Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki (Institute of Information Security, Yokohama; Kanagawa University)
Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns
Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song (State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)
Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption
Masayuki Tezuka and Keisuke Tanaka (Institute of Science Tokyo)
Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor
Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki (Institute of Information Security, Yokohama; University of Tokyo)
Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida
(Ibaraki University; University of Tsukuba; National Institute of Advanced Industrial Science and Technology; Kyushu University)
Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama
(Tokyo Metropolitan University; NTT Social Informatics Laboratories; National Institute of Information and Communications Technology; Ibaraki University)
Dingding Jia
(State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)
Haruka Nakajima Suzuki and Midori Inaba
(Institute of Information Security, Yokohama)
Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki
(Institute of Information Security, Yokohama; Kanagawa University)
Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song
(State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)
Masayuki Tezuka and Keisuke Tanaka
(Institute of Science Tokyo)
Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki
(Institute of Information Security, Yokohama; University of Tokyo)