| Role-Aware Multi-modal federated learning system for detecting phishing webpages |
Bo Wang, Imran Khan, Martin White and Natalia Beloff |
| Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation |
Leila Ben Abdelghani Bouraoui, Nadia El Mrabet, Loubna Ghammam and Lina Mortajine |
| Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method |
Yaoling Ding, Haotong Xu, Chong Luo, Annyu Liu, Zheyu Zhang, Jing Yu and An Wang |
| On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment |
Hyunmin Kim |
| Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare |
Anik Basu Bhaumik, Suman Dutta, Siyi Wang, Anubhab Baksi, Kyungbae Jang, Amit Saha, Hwajeong Seo and Anupam Chattopadhyay |
| High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers |
Minjoo Sim, Hyunjun Kim, Minwoo Lee and Hwajeong Seo |
| Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion |
Gwang-sik Kim and Young-sik Kim |
| On the Weak Differential Resistance of MGFN and the Exploration of Variants |
Bingqing Li and Ling Sun |
| Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection |
Geunwoo Baek, Jiwon Kwak and Seungjoo Kim |
| Quantum Circuit Implementation and Resource Analysis of AIM2 |
Gyeongju Song, Kyungbae Jang, Seyoung Yoon, Minwoo Lee and Hwajeong Seo |
| Comprehensive Security Analysis of End-to-End Encryption in LINE |
Takehiro Matsumoto, Atsushi Tanaka, Kyosuke Yamashita, Ryoma Ito and Takanori Isobe |
| PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies |
Juryeok Kim and Youngjoo Shin |
| On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks |
Namil Kim, Wonwoo Song, Seungjun Baek, Yongjin Jeon, Jongsung Kim and Ki Hyo Nam |
| Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption |
Yui Tsuchiya, Toi Tomita and Junji Shikata |
| Code Region Extraction Improves Scalable IoT Malware Clustering with Respect to Functional Labels |
Kosuke Nikawa, Chansu Han, Akira Tanaka, Kazuki Iwamoto, Takeshi Takahashi and Jun'Ichi Takeuchi |
| Impossibility Results of Card-Based Protocols via Mathematical Optimization |
Shunnosuke Ikeda and Kazumasa Shinagawa |
| New Derivation Rule for Linear Approximations and Its Application to ChaCha |
Zhengting Li, Lin Ding, Xinhai Wang, Honglei Wang and Jiang Wan |
| Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification |
So-Yeon Yoon and Hyun Kwon |
| Tabular or Image Input? Transformers for NIDS: A Comparative Study |
Loreen Mahmoud, Aafia Hussain and Sugata Gangopadhyay |
| A Witness Encryption for Quadratic Arithmetic Programs |
Tao-Hsiang Chang, Yu-Chen Wu, Zi-Yuan Liu, Jen Chieh Hsu, Raylin Tso and Masahiro Mambo |
| AdvCodeGen: Adversarial Code Generation via Large Language Models |
Eun Jung, Jiacheng Li, Yonghwi Kwon and Hyoungshick Kim |
| An Undeniable Signature Scheme Utilizing Module Lattices |
Kunal Dey, Mansi Goyal, Aditi Kar Gangopadhyay and Bhupendra Singh |
| Strong Designated Verifier Signatures with Non-delegatability from CSIDH |
Hiroki Minamide, Keisuke Tanaka and Masayuki Tezuka |
| Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256 |
Lee Jaeyeon, Cho Seunghyun, Jung Se Hoon and Kim Young-Sik |
| Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function |
Shoichi Hirose, Tetsu Iwata and Hidenori Kuwakado |
| Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach |
Minjoo Sim, Subin Jo, Hyuntae Song, Eunseong Kim and Hwajeong Seo |
| Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU |
Siwoo Eum, Minho Song, Minjoo Sim and Hwajeong Seo |
| Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function |
Zhuoxi Lin and Chun Guo |