AsiaJCIS 2025: Author Index

AuthorPapers
A
Asano, KyoichiA Generic Zero-Knowledge Range Argument with Preprocessing
C
Chen, Guan-YuRegistered Key-Policy Attribute-Based Encryption
Chen, Wei-RungCircular Quantum Secret Sharing Based on SWAP Gates
E
Emura, KeitaSecurity Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
F
Fan, Chun-IA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
Furumoto, KeisukeA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
G
Guan, AlbertPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
H
Hayashi, MizukiSecurity Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
Hirose, KenjiroAn Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
Huang, Jheng-JiaRegistered Key-Policy Attribute-Based Encryption
I
Igarashi, YasutakaImproved Integral Cryptanalysis on Reduced-Round Piccolo
Iwamoto, MitsuguA Generic Zero-Knowledge Range Argument with Preprocessing
J
Ji, YeontaeHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
K
Kao, Shih-PeiRegistered Key-Policy Attribute-Based Encryption
Kikuchi, HiroakiNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
Kim, HyungyeopAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
Kim, KwangjoComparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
L
Lee, Yao YuPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
Liang, HaiTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Liao, Tzu-YuCircular Quantum Secret Sharing Based on SWAP Gates
Lin, Iuon-ChangCircular Quantum Secret Sharing Based on SWAP Gates
Lin, JasonCircular Quantum Secret Sharing Based on SWAP Gates
Liu, Zi-YuanTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
Lu, Yi-JiinTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
Registered Key-Policy Attribute-Based Encryption
M
Miura, KokiNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
Miyaji, AtsukoKey-Value Commitments with Unlinkability
An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
Privacy-Preserving Attribute Domain Reconstruction for Machine Learning
Morikawa, TomohiroA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
N
Nishino, HinataA Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
O
Okumura, ShinyaAn Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
Omote, KazumasaA Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
P
Peng, XinyongTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Prabowo, Theo FanuelaHamming Metric Code-Based Signature Scheme With Restricted Vectors
Praditasari, Wibby Aldryani AstutiAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
R
Rimbawa, DanangAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
S
Sasaki, AyakoA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
Sawai, YukiA Generic Zero-Knowledge Range Argument with Preprocessing
Shibayama, NaokiImproved Integral Cryptanalysis on Reduced-Round Piccolo
T
Takahashi, TakeshiA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
Tan, Chik HowHamming Metric Code-Based Signature Scheme With Restricted Vectors
Tao, WenkangTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Tsai, Pei-ShiunCircular Quantum Secret Sharing Based on SWAP Gates
Tsai, Tien-LinTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
Registered Key-Policy Attribute-Based Encryption
Tseng, Yi-FanTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
Registered Key-Policy Attribute-Based Encryption
Tsujimoto, YutoPrivacy-Preserving Attribute Domain Reconstruction for Machine Learning
Tsujimura, TowaKey-Value Commitments with Unlinkability
W
Wang, ShuoTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Wang, Wei-HsuehRegistered Key-Policy Attribute-Based Encryption
Wang, YujueTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Watanabe, YoheiA Generic Zero-Knowledge Range Argument with Preprocessing
X
Xu, YuTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Y
Yi, OkyeonAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
Yoon, HyejinAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
You, GunsangHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
Youm, Heung YoulHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform