Accepted Papers


Title Authors
Role-Aware Multi-modal federated learning system for detecting phishing webpages Bo Wang, Imran Khan, Martin White and Natalia Beloff
Optimized Frobenius and Cyclotomic Cubing for Enhanced Pairing Computation Leila Ben Abdelghani Bouraoui, Nadia El Mrabet, Loubna Ghammam and Lina Mortajine
Breaking Masked Kyber: ResNet-Based Masked Kyber Share Recovery Method Yaoling Ding, Haotong Xu, Chong Luo, Annyu Liu, Zheyu Zhang, Jing Yu and An Wang
On the Feasibility of Deploying Lattice-Based PQC in Arm TrustZone TEEs: A Systematic Vulnerability Assessment Hyunmin Kim
Can Quantum Break ZUC? Only with a Million Qubits and a Billion Years to Spare Anik Basu Bhaumik, Suman Dutta, Siyi Wang, Anubhab Baksi, Kyungbae Jang, Amit Saha, Hwajeong Seo and Anupam Chattopadhyay
High-Speed 16-Radix Polynomial Multiplication on ARM Cortex-M4 with Recursive Karatsuba Layers Minjoo Sim, Hyunjun Kim, Minwoo Lee and Hwajeong Seo
Side-Channel Leakage Assessment of SMAUG-T: Exploiting Hamming Weight Patterns in Polynomial-to-Message Conversion Gwang-sik Kim and Young-sik Kim
On the Weak Differential Resistance of MGFN and the Exploration of Variants Bingqing Li and Ling Sun
Revealing the Chain with pytm-Seq: Approach for Multi-step Attack Detection Geunwoo Baek, Jiwon Kwak and Seungjoo Kim
Quantum Circuit Implementation and Resource Analysis of AIM2 Gyeongju Song, Kyungbae Jang, Seyoung Yoon, Minwoo Lee and Hwajeong Seo
Comprehensive Security Analysis of End-to-End Encryption in LINE Takehiro Matsumoto, Atsushi Tanaka, Kyosuke Yamashita, Ryoma Ito and Takanori Isobe
PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser Discrepancies Juryeok Kim and Youngjoo Shin
On the Resistance of Rijndael-256 against Related-Key Boomerang and Rectangle Attacks Namil Kim, Wonwoo Song, Seungjun Baek, Yongjin Jeon, Jongsung Kim and Ki Hyo Nam
Post-Quantum Fujisaki-Okamoto Transformation for Anonymous Identity-Based Encryption Yui Tsuchiya, Toi Tomita and Junji Shikata
Code Region Extraction Improves Scalable IoT Malware Clustering with Respect to Functional Labels Kosuke Nikawa, Chansu Han, Akira Tanaka, Kazuki Iwamoto, Takeshi Takahashi and Jun'Ichi Takeuchi
Impossibility Results of Card-Based Protocols via Mathematical Optimization Shunnosuke Ikeda and Kazumasa Shinagawa
New Derivation Rule for Linear Approximations and Its Application to ChaCha Zhengting Li, Lin Ding, Xinhai Wang, Honglei Wang and Jiang Wan
Generative AI-based Steganographic Techniques for Tactical Communication Message Concealment and Modification So-Yeon Yoon and Hyun Kwon
Tabular or Image Input? Transformers for NIDS: A Comparative Study Loreen Mahmoud, Aafia Hussain and Sugata Gangopadhyay
A Witness Encryption for Quadratic Arithmetic Programs Tao-Hsiang Chang, Yu-Chen Wu, Zi-Yuan Liu, Jen Chieh Hsu, Raylin Tso and Masahiro Mambo
AdvCodeGen: Adversarial Code Generation via Large Language Models Eun Jung, Jiacheng Li, Yonghwi Kwon and Hyoungshick Kim
An Undeniable Signature Scheme Utilizing Module Lattices Kunal Dey, Mansi Goyal, Aditi Kar Gangopadhyay and Bhupendra Singh
Strong Designated Verifier Signatures with Non-delegatability from CSIDH Hiroki Minamide, Keisuke Tanaka and Masayuki Tezuka
Homomorphic Transciphering for Secure Migration from LEA-128 to LEA-256 Lee Jaeyeon, Cho Seunghyun, Jung Se Hoon and Kim Young-Sik
Vector-Input Hashing Modes for Collision-Resistant Pseudorandom Function Shoichi Hirose, Tetsu Iwata and Hidenori Kuwakado
Zero-Downtime Post-Quantum TLS 1.3 Migration: A Bridge-Server-Based Approach Minjoo Sim, Subin Jo, Hyuntae Song, Eunseong Kim and Hwajeong Seo
Maximizing ARIA-CTR Performance through Kernel-Level Memory Optimization on the Apple M1 GPU Siwoo Eum, Minho Song, Minjoo Sim and Hwajeong Seo
Reconsidering Naito Feed-Forward-Free Double-Block-Length Hash Function Zhuoxi Lin and Chun Guo