Accepted Papers
These papers are listed in order of submission.
Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation
Jaehyeon Kim, Jueun Jung and Kwangjo Kim
Seoul National University, IRCS/KAIST
Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator
Suhri Kim, Eunmin Lee, Joohee Lee, Minju Lee and Hyun A Noh
Sungshin Women’s University
On the security of REDOG
Tanja Lange, Alex Pellegrini and Alberto Ravagnani
Eindhoven University of Technology
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages
Shunsuke Osaki and Noboru Kunihiro
University of Tsukuba
Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure
Keonhee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh and Dong-Guk Han
Kookmin University
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis
Yen-Ting Kuo and Atsushi Takayasu
The University of Tokyo
A Comparative Analysis of Rust-Based SGX Frameworks: Implications for building SGX applications
Heekyung Shin, Jiwon Ock, Hyeon No and Seongmin Kim
Sungshin women's university
BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols
Min Jang, Yuna Hwang, Yonghwi Kwon and Hyoungshick Kim
Samsung Electronics, University of Maryland, Sungkyunkwan University
mdTLS: How to make middlebox-aware TLS more efficient?
Taehyun Ahn, Jiwon Kwak and Seungjoo Kim
Korea University
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing
Seyeon Jeong, Eunbi Hwang, Yeongpil Cho and Taekyoung Kwon
Yonsei University, Hanyang University
Lightweight Abnormal Detection Techniques Using Low-Cost Surveillance Cameras
Yeon-Ji Lee, Na-Eun Park and Il-Gu Lee
Sungshin Women’s University
Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Case Study of Kyber
Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen and Haotong Xu
SKLOIS, Institute of Information Engineering, CAS, Beijing, China
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost
Masayuki Tezuka and Keisuke Tanaka
Tokyo Institute of Technology
Finsler Encryption
Tetsuya Nagano and Hiroaki Anada
University of Nagasaki, Aomori University
Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets
Zhenzhen Li, Xue Zihan and Wei Song
Institute of Information Engineering, CAS
Compact Identity-based Signature and Puncturable Signature from SQISign
Surbhi Shaw and Ratna Dutta
Indian Institute of Technology Kharagpur
Distinguisher and Related-Key Attack on HALFLOOP-96
Jinpeng Liu and Ling Sun
Shandong University
High Weight Code-based Signature Scheme from QC-LDPC Codes
Chik How Tan and Theo Fanuela Prabowo
National University of Singapore
Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test
Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han and Shijie Jia
SKLOIS, Institute of Information Engineering, CAS, Beijing, China
Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test
Yan Yan, Elisabeth Oswald and Arnab Roy
Klagenfurt University, University of Innsbruck
Leakage-Resilient Attribute-based Encryption with Attribute-hiding
Yijian Zhang, Yunhao Ling, Jie Chen and Luping Wang
East China Normal University, Suzhou University of Science and Technology
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners
Shun Uchizono, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto
The University of Electro-Communications, Toyohashi University of Technology, National Institute of Advanced Industrial Science and Technology
Single-Shuffle Card-Based Protocols with Six Cards per Gate
Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto
The University of Electro-Communications, Ibaraki University, Toyohashi University of Technology
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy
Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe
The University of Electro-Communications
Enhancing the Related-Key Security of PIPO through New Key Schedules
Seungjun Baek, Yongjin Jeon, Giyoon Kim and Jongsung Kim
Kookmin University
Revisiting Key Switching Techniques with Applications to Light-Key FHE
Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu and Kunpeng Wang
State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS
Optimized Quantum Implementation of SEED
Yujin Oh, Kyoungbae Jang, Yu-Jin Yang and Hwajeong Seo
Hansung University
Depth-Optimized Quantum Implementation of ARIA
Yu-Jin Yang, Kyung-bae Jang, Yu-jin Oh and Hwa-Jeong Seo
Hansung University
Finding Shortest Vector using Quantum NV Sieve on Grover
Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn and Hwajeong Seo
Hansung University, Korea Institute of Science and Technology Information (KISTI)
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator
Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Noboru Kunihiro and Tetsuya Izu
Fujitsu Limited, University of Tsukuba
Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis
Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim
Pusan National University