Accepted Papers
The list of accepted papers:
- Mugurel Barcau, Cristian Lupascu, Vicentiu Pasol and George Catalin Turcas. Bridges connecting Encryption Schemes
- Giampaolo Bella. The right level of human interaction to establish cybersecurity
- Debasmita Chakraborty and Santu Pal. Superpoly Recovery of Grain-128AEAD Using Division Property
- Giovanni Di Crescenzo, Matluba Khodjaeva, Ta Chen, Rajesh Krishnan, David Shur, Delaram Kahrobaei and Vladimir Shpilrain. On Single-Server Delegation of RSA
- Subhranil Dutta, Ratna Dutta and Sourav Mukhopadhyay. Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy
- Johann Groszschaedl and Christian Franck. Lightweight Permutation-Based Cryptography for the Ultra Low Power Internet of Things
- Amirreza Hamidi and Hossein Ghodosi. Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem
- Yun Ju Huang, Mohamed Rachidi and Emanuele Bellini. Statistical tests for symmetric primitives An application to NIST Lightweight finalists
- Murat Burhan Ilter and Ali Aydın Selçuk. MILP-aided Cryptanalysis of the FUTURE Block Cipher
- Ahmad Khoureich Ka. Easy-ABE: An Easy Ciphertext-Policy Attribute-Based Encryption
- Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi and Jason Paul Cruz. MOTUS: How Quantized Parameters Improve Protection of Models and Their Inference Inputs
- Yuichi Komano, Mitsugu Iwamoto, Kazuo Ohta and Kazuo Sakiyama. Lightweight Authentication using Noisy Key Derived from Physically Unclonable Function
- Yuichi Komano and Takaaki Mizuki. Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
- Lukasz Lapczyk and David Skillicorn. Activity Detection from Encrypted Remote Desktop Protocol Traffic
- Jana Medková and Josef Hynek. Application-Oriented Anonymization Framework for Social Network Datasets and IoT Environments
- Sampath Rajapaksha, Janaka Senanayake, Harsha Kumara Kalutarage, Mhd Omar Al Kadri and Tayyaba Nafees. AI-Powered Vulnerability Detection for Secure Source Code Development
- Masahisa Shimano, Kazuo Sakiyama and Daiki Miyahara. Towards Verifying Physical Assumption in Card-Based Cryptography
- George Teseleanu. The Security of Quasigroups Based Substitution Permutation Networks
- Hikaru Tsuchida, Takuya Ishibashi and Toshihiro Ohigashi. Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-Monotone Access Structures
- Wei Xu, Yan Gao, Zheng-Jun Zha and Chunfang Yang. An Improved Purdue Enterprise Reference Architecture to Enhance Cybersecurity