| 2026 | Cryptology and Network Security - 24th International Conference, CANS 2025, Osaka, Japan, November 17-20, 2025, Proceedings Yongdae Kim, Atsuko Miyaji, Mehdi Tibouchi |
| 2025 | A Key-Update Mechanism for the Space Data Link Security Protocol. Andreas Hülsing, Tanja Lange, Fiona Johanna Weber |
| 2025 | Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. Alireza Taheri Tajar, Reza Rahaeimehr |
| 2025 | Attention-Based Code Summarization for Multi-label Vulnerability Detection. Maksuda Bilkis Baby, Md. Atabuzzaman, Md Shajalal, Gunnar Stevens |
| 2025 | Attribute-Based Key Exchange with Optimal Efficiency. Liqun Chen, Long Meng, Mark Manulis, Yangguang Tian, Yinghui Zhang |
| 2025 | Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. Maxim Jourenko, Marcus Völker |
| 2025 | Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. Stefano Simonetto, Ronan Oosteven, Thijs van Ede, Peter Bosch, Willem Jonker |
| 2025 | Codes on Any Cayley Graph Have an Interactive Oracle Proof of Proximity. Hugo Delavenne, Louise Lallemand |
| 2025 | Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation. Parisa Amiri-Eliasi, Lejla Batina, Silvia Mella |
| 2025 | Compressed Verification for Post-quantum Signatures with Long-Term Public Keys. Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith |
| 2025 | Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions. Luca Bonamino, Pierrick Méaux |
| 2025 | Decentralized Fair Exchange with Advertising. Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini |
| 2025 | DiSK - A Deniable Split KEM from Lattices. Brian Goncalves, Atefeh Mashatan |
| 2025 | Efficient Fuzzy Labeled PSI from Vector Ring-OLE. Dung Bui, Kelong Cong |
| 2025 | Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions. Yoshiaki Honda, Kazumasa Shinagawa |
| 2025 | Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers. Daniel Berend, Amit Cohen, Shahar Golan, Boris Tsirkin, Yochai Twitto, Itamar Zimerman |
| 2025 | Faster FHEW Bootstrapping with Adaptive Key Update. Qi Zhang, Mingqiang Wang, Xiaopeng Cheng |
| 2025 | Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic. Furqan Rustam, Islam Obaidat, Davide Di Monda, Anca Delia Jurcut |
| 2025 | Fully Verifiable Ciphertext-Policy Attribute-Based Encryption. Quoc-Bao Ninh, Cao Quang Phat, Tran Trung Dung |
| 2025 | Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. Qingjie Hu, Zhen Liu, Yuchen Cao, Guanju Xiao, Jianhua Wang |
| 2025 | Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption. Yuto Imura, Keita Emura |
| 2025 | Impossibility of Four-Card AND Protocols with a Single Closed Shuffle. Shizuru Iino, Shota Ikeda, Kazumasa Shinagawa, Yang Li, Kazuo Sakiyama, Daiki Miyahara |
| 2025 | Impossible Differential Attack on SAND-128. Nobuyuki Sugio |
| 2025 | Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirectional Tree-Structured Embedding Model. Cong Cao, Xiaohan Wang, Shunda Pan, Guohang Shen, Haipeng Qu |
| 2025 | On the Relations Between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. Takeshi Yoshida, Keita Emura |
| 2025 | Revisiting Rational Broadcast Protocols. Shunya Otomo, Kenji Yasunaga |
| 2025 | Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizár |
| 2025 | Strong Designated Verifier Signatures from Isogeny Assumptions. Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Yannan Li, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto |
| 2025 | Synthetic Lateral Movement Data Generation for Azure Cloud: A Hopper-Based Approach. Mohammad Mamun, Hadeer Ahmed, Anas Mabrouk, Sherif Saad |
| 2025 | To Extend or Not to Extend: Agile Masking Instructions for PQC. Markus Krausz, Georg Land, Florian Stolz, Jan Richter-Brockmann, Tim Güneysu |
| 2025 | Unveiling the Critical Attack Path for Implanting Backdoors in Supply Chains: Practical Experience from XZ. Mario Lins, René Mayrhofer, Michael Roland |
| 2025 | What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs. Stefano Simonetto, Ronan Oosteven, Thijs van Ede, Peter Bosch, Willem Jonker |
| 2025 | WiperSentinel: HPC Based Wiper Detection with Enhanced AutoEncoder. Shiva Agarwal, Suvadeep Hajra, Ayantika Chatterjee, Debdeep Mukhopadhyay |
| 2025 | webSPDZ: Versatile MPC on the Web. Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger |