Accepted Papers


These papers are listed in order of submission. 

 

Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation

Jaehyeon Kim, Jueun Jung and Kwangjo Kim

Seoul National University, IRCS/KAIST


Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator

Suhri Kim, Eunmin Lee, Joohee Lee, Minju Lee and Hyun A Noh

Sungshin Women’s University
 

On the security of REDOG

Tanja Lange, Alex Pellegrini and Alberto Ravagnani

Eindhoven University of Technology


Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages

Shunsuke Osaki and Noboru Kunihiro

University of Tsukuba
 

Single Trace Analysis of Comparison Operation based Constant-Time CDT Sampling and Its Countermeasure

Keonhee Choi, Ju-Hwan Kim, Jaeseung Han, Jae-Won Huh and Dong-Guk Han

Kookmin University


A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis

Yen-Ting Kuo and Atsushi Takayasu

The University of Tokyo


A Comparative Analysis of Rust-Based SGX Frameworks: Implications for building SGX applications

Heekyung Shin, Jiwon Ock, Hyeon No and Seongmin Kim

Sungshin women's university


BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols

Min Jang, Yuna Hwang, Yonghwi Kwon and Hyoungshick Kim

Samsung Electronics, University of Maryland, Sungkyunkwan University


mdTLS: How to make middlebox-aware TLS more efficient?

Taehyun Ahn, Jiwon Kwak and Seungjoo Kim

Korea University
 

PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing

Seyeon Jeong, Eunbi Hwang, Yeongpil Cho and Taekyoung Kwon

Yonsei University, Hanyang University


Lightweight Abnormal Detection Techniques Using Low-Cost Surveillance Cameras

Yeon-Ji Lee, Na-Eun Park and Il-Gu Lee

Sungshin Women’s University


Side-Channel Analysis on Lattice-Based KEM using Multi-feature Recognition - The Case Study of Kyber

Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen and Haotong Xu

SKLOIS, Institute of Information Engineering, CAS, Beijing, China


1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost

Masayuki Tezuka and Keisuke Tanaka

Tokyo Institute of Technology


Finsler Encryption

Tetsuya Nagano and Hiroaki Anada

University of Nagasaki, Aomori University


Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Sets

Zhenzhen Li, Xue Zihan and Wei Song

Institute of Information Engineering, CAS


Compact Identity-based Signature and Puncturable Signature from SQISign

Surbhi Shaw and Ratna Dutta

Indian Institute of Technology Kharagpur


Distinguisher and Related-Key Attack on HALFLOOP-96

Jinpeng Liu and Ling Sun

Shandong University


High Weight Code-based Signature Scheme from QC-LDPC Codes

Chik How Tan and Theo Fanuela Prabowo

National University of Singapore


Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test

Yuan Ma, Weisong Gu, Tianyu Chen, Na Lv, Dongchi Han and Shijie Jia

SKLOIS, Institute of Information Engineering, CAS, Beijing, China


Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test

Yan Yan, Elisabeth Oswald and Arnab Roy

Klagenfurt University, University of Innsbruck


Leakage-Resilient Attribute-based Encryption with Attribute-hiding

Yijian Zhang, Yunhao Ling, Jie Chen and Luping Wang

East China Normal University, Suzhou University of Science and Technology


Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners

Shun Uchizono, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto

The University of Electro-Communications, Toyohashi University of Technology, National Institute of Advanced Industrial Science and Technology


Single-Shuffle Card-Based Protocols with Six Cards per Gate

Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe and Mitsugu Iwamoto

The University of Electro-Communications, Ibaraki University, Toyohashi University of Technology


Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy

Takumi Amada, Mitsugu Iwamoto and Yohei Watanabe

The University of Electro-Communications


Enhancing the Related-Key Security of PIPO through New Key Schedules

Seungjun Baek, Yongjin Jeon, Giyoon Kim and Jongsung Kim

Kookmin University


Revisiting Key Switching Techniques with Applications to Light-Key FHE

Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu and Kunpeng Wang

State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS


Optimized Quantum Implementation of SEED

Yujin Oh, Kyoungbae Jang, Yu-Jin Yang and Hwajeong Seo

Hansung University


Depth-Optimized Quantum Implementation of ARIA

Yu-Jin Yang, Kyung-bae Jang, Yu-jin Oh and Hwa-Jeong Seo

Hansung University


Finding Shortest Vector using Quantum NV Sieve on Grover

Hyunji Kim, Kyoungbae Jang, Yujin Oh, Woojin Seok, Wonhuck Lee, Kwangil Bae, Ilkwon Sohn and Hwajeong Seo

Hansung University, Korea Institute of Science and Technology Information (KISTI)


Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator

Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Noboru Kunihiro and Tetsuya Izu

Fujitsu Limited, University of Tsukuba


Quantum Circuits for High-Degree and Half Multiplication For Post-Quantum Analysis

Rini Wisnu Wardhani, Dedy Septono Catur Putranto and Howon Kim

Pusan National University