Accepted Papers
First Submission
Second Submission
-
Non-Interactive Privacy-Preserving Record Linkage using Polynomial Sparsity Testing
Frederik Armknecht, Youzhe Heng and Jochen Schäfer
(University of Mannheim) -
Public Key Encryption with Equality Test from Tag-Based Encryption
Masayuki Tezuka and Keisuke Tanaka
(Institute of Science Tokyo) -
Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction
Koji Nuida
(Kyushu University / National Institute of Advanced Industrial Science and Technology) -
Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding
Shintaro Narisada, Hiroki Okada, Yusuke Aikawa and Kazuhide Fukushima
(KDDI Research; The University of Tokyo) -
Cyber Threat Intelligence Report Summarization with Named Entity Recognition
Tomoaki Mimoto, Kentaro Kita, Yuta Gempei, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka
(KDDI Research; University of Hyogo) -
Multi-Designated Verifier Ring Signature: Generic Construction from Standard Primitives
Yuuki Fujita, Keisuke Hara, Keitaro Hashimoto and Kyosuke Yamashita
(Osaka University; National Institute of Advanced Industrial Science and Technology; Yokohama National University) -
Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies
Yonghwa Lee, Wonseok Choi and Donghyun Nam
(Theori Inc.; Korea University; Inha University) -
Blockchain-based Economic Voting with Posterior Security from Lattices
Navid Abapour, Amir Kafshdar Goharshady, Constantin Catalin Dragan and Mahdi Mahdavi
(University of Surrey; University of Oxford; Universitat Oberta de Catalunya) -
Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated Differential Privacy
Takumasa Ishioka and Masayuki Terada
(Kyoto Tachibana University) -
Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata
Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge and Junaid Haseeb
(The University of Waikato) -
Accelerating Simulations of Bitvector-Based LDP Protocols via Binomial Modeling
Yusuf Cemal Karatas and M. Emre Gursoy
(Koç University) -
Minimum number of up-down cards for finite-time committed-AND protocol without interlocking operations
Atsushi Iwasaki
(Saga University) -
Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code Analysis
Kentaro Kita, Yuta Gempei, Tomoaki Mimoto, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka
(KDDI Research; University of Hyogo) -
Evaluation of Adversarial Input Attacks in Retrieval-Augmented Generation Using Large Language Models
Kento Hasegawa, Seira Hidano and Kazuhide Fukushima
(KDDI Research) -
Sequence Length Aggregation and Behavioral Biometrics: A Case Study in Professional Player Authentication via Tree-Based Classification
Franziska Zimmer, Mhd Irvan, Maharage Nisansala Sevwandi Perera, Ryosuke Kobayashi and Rie Shigetomi Yamaguchi
(The University of Tokyo) -
One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK
Christian Müller, Vasily Mikhalev, Yves T. Staudenmaier and Frederik Armknecht
(University of Mannheim) -
Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?
Max Cartor, Mark Lewis, Jacob Lichtinger, Ray Perlner and Daniel Smith-Tone
(Bellarmine University; University of Louisville; National Institute of Standards and Technology) -
Cryptanalysis of the best HFE-LL' Constructions
Daniel Smith-Tone and Cristian Valenzuela
(National Institute of Standards and Technology; University of Louisville) -
Approximate CRT-Based Gadget Decomposition for Fully Homomorphic Encryption
Olivier Bernard and Marc Joye
(Zama)
Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida
(Ibaraki University; University of Tsukuba; National Institute of Advanced Industrial Science and Technology; Kyushu University)
Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama
(Tokyo Metropolitan University; NTT Social Informatics Laboratories; National Institute of Information and Communications Technology; Ibaraki University)
Dingding Jia
(State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)
Haruka Nakajima Suzuki and Midori Inaba
(Institute of Information Security, Yokohama)
Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki
(Institute of Information Security, Yokohama; Kagawa University)
Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song
(State Key Laboratory of Cyberspace Security Defense & University of Chinese Academy of Sciences)
Masayuki Tezuka and Keisuke Tanaka
(Institute of Science Tokyo)
Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki
(Institute of Information Security, Yokohama; University of Tokyo)