Program at a Glance
November 25th (Day 1), 2025
November 26th (Day 2), 2025
| Time (JST) | Session | Content |
|---|---|---|
| 09:00–10:20 |
Session 4: Privacy |
(09:00-09:20) Non-Interactive Privacy-Preserving Record Linkage using Polynomial Sparsity Testing Frederik Armknecht, Youzhe Heng and Jochen Schäfer (09:20-09:40) Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction Koji Nuida (09:40-10:00) Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated Differential Privacy Takumasa Ishioka and Masayuki Terada (10:00-10:20) Accelerating Simulations of Bitvector-Based LDP Protocols via Binomial Modeling Yusuf Cemal Karatas and M. Emre Gursoy |
| 10:20–10:40 | Poster & Break | |
| 10:40–11:40 |
Session 5: Fundamental Cryptography |
(10:40-11:00) Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida (11:00-11:20) Minimum number of up-down cards for finite-time committed-AND protocol without interlocking operations Atsushi Iwasaki (11:20-11:40) Approximate CRT-Based Gadget Decomposition for Fully Homomorphic Encryption Olivier Bernard and Marc Joye |
| 11:40–11:50 | Poster & Break | |
| 11:50–12:30 |
Session 6: Post-Quantum Cryptography I |
(11:50-12:10) An Extended Rectangular MinRank Attack against UOV and Its Variants Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama (12:10-12:30) Cryptanalysis of the best HFE-LL' Constructions Daniel Smith-Tone and Cristian Valenzuela |
| 12:30– | Lunch & Excursion | |
| 19:00–21:30 | Banquet |
November 27th (Day 3), 2025
| Time (JST) | Session | Content |
|---|---|---|
| 09:00–11:00 | Special Session | Building a Global Digital Privacy Curriculum: A Collaborative Initiative |
| 11:00–11:20 | Break | |
| 11:20–12:20 | Keynote II | |
| 12:20–13:40 | Lunch | |
| 13:40–14:40 |
Session 7: Post-Quantum Cryptography II |
(13:40-14:00) Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding Shintaro Narisada, Hiroki Okada, Yusuke Aikawa and Kazuhide Fukushima (14:00-14:20) Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size? Max Cartor, Mark Lewis, Jacob Lichtinger, Ray Perlner and Daniel Smith-Tone (14:20-14:40) Blockchain-based Economic Voting with Posterior Security from Lattices Navid Abapour, Amir Kafshdar Goharshady, Constantin Catalin Dragan and Mahdi Mahdavi |
| 14:40–15:00 | Break | |
| 15:00–16:20 |
Session 7: AI and Usable Security |
(15:00-15:20) Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies Yonghwa Lee, Wonseok Choi and Donghyun Nam (15:30-15:40) Evaluation of Adversarial Input Attacks in Retrieval-Augmented Generation Using Large Language Models Kento Hasegawa, Seira Hidano and Kazuhide Fukushima (15:40-16:00) Sequence Length and Behavioral Biometrics: A Case Study in Professional Player Authentication Franziska Zimmer, Mhd Irvan, Maharage Nisansala Sevwandi Perera, Ryosuke Kobayashi and Rie Shigetomi Yamaguchi (16:00-16:20) Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect Haruka Nakajima Suzuki and Midori Inaba |
| 16:20–16:30 | Closing |
Details of Special Session
Building a Global Digital Privacy Curriculum: A Collaborative Initiative
Organizers:
- Gurvirender P.S. Tejay (Zarb School of Business, Hofstra University, New York, USA)
- Kai Rannenberg (Goethe University, Frankfurt, Germany)
- Ümit Cali (University of York, York, UK)
- Rajendra Raj (Rochester Institute of Technology, New York, USA)
- Travis Breaux (Carnegie Mellon University, Pennsylvania, USA)
- Ernesto Cuadross-Vargas (National University of Engineering, Lima, Peru)
- Sara Foresti (Università degli Studi di Milano, Milano, Italy)
- Andrew McGettrick (University of Strathclyde, Glasgow, Scotland)
- Tamara Bonaci (Northeastern University, Washington, USA)
- Surya Prakash Nalluri (Citigroup, Texas, USA)
Special Session Description:
As digital privacy concerns intensify across technology and communication sectors, there is a critical gap in specialized graduate education for privacy professionals. To address this, a global consortium including ACM, IEEE Computer Society, IEEE Digital Privacy Initiative, and IFIP has crafted a unified Privacy Curricular Guideline. This framework outlines eight core knowledge domains - spanning technical, legal, and applied dimensions - essential for training privacy engineers and policymakers. This special session introduces the guideline's innovative design and invites participants to collaboratively enhance its applicability through interactive discussions. Following the special session, attendees will be invited to join one of the initiative's Working Groups to contribute directly to the ongoing development of the guideline. Their expertise will be critical in finalizing a global framework that supports both academic programs and industry needs. With privacy topics currently fragmented across security courses, this initiative seeks to consolidate and elevate privacy education, empowering graduates to meet the complex demands of emerging privacy roles in a rapidly evolving digital landscape.
This special session is open to all IWSEC2025 participants.
Session 1: Intelligence for Cybersecurity
(09:20-09:40) Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis
Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki
(09:40-10:00) Cyber Threat Intelligence Report Summarization with Named Entity Recognition
Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka
(10:00-10:20) Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata
Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge and Junaid Haseeb
(10:20-10:40) Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code Analysis
Kentaro Kita, Yuta Gempei, Tomoaki Mimoto, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka
Session 2: Applied Cryptography
(11:00-11:20) Dynamic Collusion Function-Private Functional Encryption
Dingding Jia
(11:20-11:40) Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption
Masayuki Tezuka and Keisuke Tanaka
(11:40-12:00) Public Key Encryption with Equality Test from Tag-Based Encryption
Masayuki Tezuka and Keisuke Tanaka
(12:00-12:20) Multi-Designated Verifier Ring Signature: Generic Construction from Standard Primitives
Yuuki Fujita, Keisuke Hara, Keitaro Hashimoto and Kyosuke Yamashita
Session 3: Vulnerability Analysis
(15:00-15:20) One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK
Christian Müller, Vasily Mikhalev, Yves T. Staudenmaier and Frederik Armknecht
(15:20-15:40) Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns
Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song
(15:40-16:00) Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor
Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki