Program at a Glance

November 25th (Day 1), 2025

Time (JST) Session Content
09:00–09:20 Opening
09:20–10:40

Session 1: Intelligence for Cybersecurity

(09:20-09:40) Benign Activity Extraction for Dependency Reduction in Data Provenance-based Attack Analysis

Taishin Saito, Masaki Hashimoto and Kuniyasu Suzaki

(09:40-10:00) Cyber Threat Intelligence Report Summarization with Named Entity Recognition

Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka

(10:00-10:20) Tracking Security Smell Diffusion Patterns in Ansible Playbooks Using Metadata

Pandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge and Junaid Haseeb

(10:20-10:40) Detecting Fake Proof-of-Concept Codes on GitHub Using Static Code Analysis

Kentaro Kita, Yuta Gempei, Tomoaki Mimoto, Takamasa Isohara, Shinsaku Kiyomoto and Toshiaki Tanaka

10:40–11:00 Break
11:00–12:20

Session 2: Applied Cryptography

(11:00-11:20) Dynamic Collusion Function-Private Functional Encryption

Dingding Jia

(11:20-11:40) Ordered Multi-Signatures with Public-Key Aggregation from SXDH Assumption

Masayuki Tezuka and Keisuke Tanaka

(11:40-12:00) Public Key Encryption with Equality Test from Tag-Based Encryption

Masayuki Tezuka and Keisuke Tanaka

(12:00-12:20) Multi-Designated Verifier Ring Signature: Generic Construction from Standard Primitives

Yuuki Fujita, Keisuke Hara, Keitaro Hashimoto and Kyosuke Yamashita

12:20–13:40 Lunch
13:40–14:40 Keynote I
14:40–15:00 Break
15:00–16:00

Session 3: Vulnerability Analysis

(15:00-15:20) One Antenna Is Enough For Neutralizing Jamming In IEEE 802.15.4 BPSK

Christian Müller, Vasily Mikhalev, Yves T. Staudenmaier and Frederik Armknecht

(15:20-15:40) Detecting and Mitigating Conflict-Based Cache Side-Channel Attacks by Monitoring Ping-Pong Accesses Patterns

Hao Ma, Zhidong Wang, Da Xie, Jinchi Han and Wei Song

(15:40-16:00) Analyzing and Mitigating the SSB Vulnerability in an MDP-Equipped RISC-V Processor

Tuo Chen, Reoma Matsuo, Ryota Shioya and Kuniyasu Suzaki

16:00–17:50 Poster & Break
18:00–20:00 Welcome Reception

November 26th (Day 2), 2025

Time (JST) Session Content
09:00–10:20

Session 4: Privacy

(09:00-09:20) Non-Interactive Privacy-Preserving Record Linkage using Polynomial Sparsity Testing

Frederik Armknecht, Youzhe Heng and Jochen Schäfer

(09:20-09:40) Improved Private Simultaneous Messages Protocols for Symmetric Functions with Universal Reconstruction

Koji Nuida

(09:40-10:00) Utility of the Non-Negative Wavelet Mechanism with Zero-Concentrated Differential Privacy

Takumasa Ishioka and Masayuki Terada

(10:00-10:20) Accelerating Simulations of Bitvector-Based LDP Protocols via Binomial Modeling

Yusuf Cemal Karatas and M. Emre Gursoy

10:20–10:40 Poster & Break
10:40–11:40

Session 5: Fundamental Cryptography

(10:40-11:00) Efficient Card-Based Protocols for Symmetric and Partially Doubly Symmetric Functions

Shota Ikeda, Yoshihiro Takahashi, Kazumasa Shinagawa and Koji Nuida

(11:00-11:20) Minimum number of up-down cards for finite-time committed-AND protocol without interlocking operations

Atsushi Iwasaki

(11:20-11:40) Approximate CRT-Based Gadget Decomposition for Fully Homomorphic Encryption

Olivier Bernard and Marc Joye

11:40–11:50 Poster & Break
11:50–12:30

Session 6: Post-Quantum Cryptography I

(11:50-12:10) An Extended Rectangular MinRank Attack against UOV and Its Variants

Toshihiro Suzuki, Hiroki Furue, Takuma Ito, Shuhei Nakamura and Shigenori Uchiyama

(12:10-12:30) Cryptanalysis of the best HFE-LL' Constructions

Daniel Smith-Tone and Cristian Valenzuela

12:30– Lunch & Excursion
19:00–21:30 Banquet

November 27th (Day 3), 2025

Time (JST) Session Content
09:00–11:00 Special Session Building a Global Digital Privacy Curriculum: A Collaborative Initiative
11:00–11:20 Break
11:20–12:20 Keynote II
12:20–13:40 Lunch
13:40–14:40

Session 7: Post-Quantum Cryptography II

(13:40-14:00) Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding

Shintaro Narisada, Hiroki Okada, Yusuke Aikawa and Kazuhide Fukushima

(14:00-14:20) Practical Lattice Attack and Patched Parameters for 2F Multivariate Encryption: Is 2F Still Better Than Standard Lattice Constructions for Small Ciphertext Size?

Max Cartor, Mark Lewis, Jacob Lichtinger, Ray Perlner and Daniel Smith-Tone

(14:20-14:40) Blockchain-based Economic Voting with Posterior Security from Lattices

Navid Abapour, Amir Kafshdar Goharshady, Constantin Catalin Dragan and Mahdi Mahdavi

14:40–15:00 Break
15:00–16:20

Session 7: AI and Usable Security

(15:00-15:20) Supply Chain Threats in the MCP Ecosystem: Attack Vectors and Mitigation Strategies

Yonghwa Lee, Wonseok Choi and Donghyun Nam

(15:30-15:40) Evaluation of Adversarial Input Attacks in Retrieval-Augmented Generation Using Large Language Models

Kento Hasegawa, Seira Hidano and Kazuhide Fukushima

(15:40-16:00) Sequence Length and Behavioral Biometrics: A Case Study in Professional Player Authentication

Franziska Zimmer, Mhd Irvan, Maharage Nisansala Sevwandi Perera, Ryosuke Kobayashi and Rie Shigetomi Yamaguchi

(16:00-16:20) Nudges to Reduce the Spread of Online Disinformation: A Comparison with the Educational Effect

Haruka Nakajima Suzuki and Midori Inaba

16:20–16:30 Closing

Details of Special Session

Building a Global Digital Privacy Curriculum: A Collaborative Initiative

Organizers:

  • Gurvirender P.S. Tejay (Zarb School of Business, Hofstra University, New York, USA)
  • Kai Rannenberg (Goethe University, Frankfurt, Germany)
  • Ümit Cali (University of York, York, UK)
  • Rajendra Raj (Rochester Institute of Technology, New York, USA)
  • Travis Breaux (Carnegie Mellon University, Pennsylvania, USA)
  • Ernesto Cuadross-Vargas (National University of Engineering, Lima, Peru)
  • Sara Foresti (Università degli Studi di Milano, Milano, Italy)
  • Andrew McGettrick (University of Strathclyde, Glasgow, Scotland)
  • Tamara Bonaci (Northeastern University, Washington, USA)
  • Surya Prakash Nalluri (Citigroup, Texas, USA)

Special Session Description:

As digital privacy concerns intensify across technology and communication sectors, there is a critical gap in specialized graduate education for privacy professionals. To address this, a global consortium including ACM, IEEE Computer Society, IEEE Digital Privacy Initiative, and IFIP has crafted a unified Privacy Curricular Guideline. This framework outlines eight core knowledge domains - spanning technical, legal, and applied dimensions - essential for training privacy engineers and policymakers. This special session introduces the guideline's innovative design and invites participants to collaboratively enhance its applicability through interactive discussions. Following the special session, attendees will be invited to join one of the initiative's Working Groups to contribute directly to the ongoing development of the guideline. Their expertise will be critical in finalizing a global framework that supports both academic programs and industry needs. With privacy topics currently fragmented across security courses, this initiative seeks to consolidate and elevate privacy education, empowering graduates to meet the complex demands of emerging privacy roles in a rapidly evolving digital landscape.

This special session is open to all IWSEC2025 participants.