- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17-20, 2025.
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.
Contents
.- Post-Quantum Cryptography.
.- Compressed verification for post-quantum signatures with long-term public keys.
.- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its
Application in NTRUReEncrypt.
.- Strong Designated Verifier Signatures from Isogeny Assumptions.
.- To extend or not to extend: Agile Masking Instructions for PQC.
.- Symmetric-Key Cryptography.
.- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation.
.- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs.
.- Computing the restricted algebraic immunity, and application to WPB functions.
.- Multi-Party Computation.
.- Efficient Fuzzy Labeled PSI from Vector Ring-OLE.
.- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with
Partial-Open Actions.
.- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle.
.- webSPDZ: Versatile MPC on the Web.
.- Advanced Encryption.
.- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption.
.- On the Relations between Matchmaking Public Key Encryption and Public Key
Authenticated Encryption with Keyword Search.
.- Faster FHEW Bootstrapping with Adaptive Key Update.
.- Cryptographic Protocols and Blockchain.
.- Attribute-based Key Exchange with Optimal Efficiency.
.- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity.
.- Decentralized Fair Exchange with Advertising.
.- Revisiting Rational Broadcast Protocols.
.- Vulnerability Detection.
.- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder.
.- Attention-based Code Summarization for Multi-label Vulnerability Detection.
.- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model.
.- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE
Mapping with LLMs.
.- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text.
.- Attacks.
.- Unveiling the critical attack path for implanting backdoors in supply chains:
Practical experience from XZ.
.- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach.
.- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns.
.- Short Papers.
.- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers.
.- DiSK: A Deniable Split KEM from The MLWE Problem.
.- A Key-Update Mechanism for the Space Data Link Security Protocol.
.- Automated Verification of Proofs in the Universal Composability Framework
with Markov Decision Processes.
.- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption.
.- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic.
.- Impossible Differential Attack on SAND-128.



