Accepted Posters

  • Advancing TMIS Security: Post-Quantum Lattice-Based Authentication
    Pramod Kumar Maurya, Haradhan Ghosh and Satya Bagchi

  • Enhancing ERP Systems’ Security: A Conceptual Model for Continuous User Authentication Using Multimodal Biometrics
    Nadeen Hamza, Gamal Kassem and Nadeen Hamza

  • Balancing Cyber Security and Privacy: A Comparative Study of Data Protection Frameworks Across Jurisdictions
    Yuki Kodaka, Hirokazu Hasegawa and Hiroki Takakura

  • Improving Quantum Circuits of Shor's Algorithm for Binary Elliptic Curves
    Kaien Sho and Atsushi Takayasu

  • Connected to a Fake: Bidding-down 5G Confidentiality through Relaying
    Jieon Oh, Chaeyeon You, Bonam Kim and Ilsun You

  • Hardening 5G UDR Authentication Data against Server Compromise Using SGX-Based Encrypted Storage
    Adi Panca Saputra Iskandar, Changhyeon Woo and Ilsun You

  • A Trojan Detection Method for IoT Devices Using Binary Fuzzing and Behavioral Comparison with Benign Programs
    Tsuyoshi Kaneshiro, Yuta Takata, Hiroshi Kumagai, Masaki Kamizono and Toshihiro Yamauchi

  • A High-Speed Web Scanning Platform for Risk Assessment Backed by a Web Asset Database
    Kosuke Watanabe and Taichi Saito

  • How Social Media Platforms Are Used for CTI: Needs, Practices, and Platform-Specific Differences
    Shota Fujii, Goki Hanawa, Takayuki Sato and Nobutaka Kawaguchi

  • Isogeny-based threshold encryption using POKE proposed by Basso et al. at EUROCRYPT 2025
    Toshiki Takatera, Hiroshi Onuki and Tsuyoshi Takagi

  • An SVP Solver of Enumeration-Sieve-Reduction Hybrid Lattice Algorithm
    Kazutaka Toda and Yuntao Wang

  • Module-pqe: A Module-LWE based KEM Scheme
    Takuya Moriwaki and Yuntao Wang

  • Efficient Identity-Based Inner Product Functional Encryption from LWE with Adaptive Security in Standard Model
    Yuki Higuchi and Atsushi Takayasu

  • Efficiency Evaluation of CSIDH-Based Signatures with Edwards Curves and their Quadratic Twists
    Yuki Iwata, Hiroki Minamide, Takeshi Nakai and Koutarou Suzuki

  • Efficient Algorithms for Solving Underdetermined MQ Problems
    Hideki Asanuma, Kosuke Sakata and Tsuyoshi Takagi

  • Generalized Malicious Security for Private Set Intersection
    Yugo Kasashima, Kota Sugimoto, Mitsugu Iwamoto and Yohei Watanabe

  • On the Public Verifiability of CCA-Secure Public-Key Encryption
    Masaya Yoshimura, Kyoichi Asano, Keita Emura, Atsushi Takayasu and Yohei Watanabe