CANS B

34 papers

YearTitle / Authors
2026Cryptology and Network Security - 24th International Conference, CANS 2025, Osaka, Japan, November 17-20, 2025, Proceedings
Yongdae Kim, Atsuko Miyaji, Mehdi Tibouchi
2025A Key-Update Mechanism for the Space Data Link Security Protocol.
Andreas Hülsing, Tanja Lange, Fiona Johanna Weber
2025Acoustic Side Channel Attack on Keyboards Based on Typing Patterns.
Alireza Taheri Tajar, Reza Rahaeimehr
2025Attention-Based Code Summarization for Multi-label Vulnerability Detection.
Maksuda Bilkis Baby, Md. Atabuzzaman, Md Shajalal, Gunnar Stevens
2025Attribute-Based Key Exchange with Optimal Efficiency.
Liqun Chen, Long Meng, Mark Manulis, Yangguang Tian, Yinghui Zhang
2025Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes.
Maxim Jourenko, Marcus Völker
2025Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text.
Stefano Simonetto, Ronan Oosteven, Thijs van Ede, Peter Bosch, Willem Jonker
2025Codes on Any Cayley Graph Have an Interactive Oracle Proof of Proximity.
Hugo Delavenne, Louise Lallemand
2025Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation.
Parisa Amiri-Eliasi, Lejla Batina, Silvia Mella
2025Compressed Verification for Post-quantum Signatures with Long-Term Public Keys.
Gustavo Banegas, Anaëlle Le Dévéhat, Benjamin Smith
2025Computing the Restricted Algebraic Immunity, and Application to Weightwise Perfectly Balanced Functions.
Luca Bonamino, Pierrick Méaux
2025Decentralized Fair Exchange with Advertising.
Pierpaolo Della Monica, Ivan Visconti, Andrea Vitaletti, Marco Zecchini
2025DiSK - A Deniable Split KEM from Lattices.
Brian Goncalves, Atefeh Mashatan
2025Efficient Fuzzy Labeled PSI from Vector Ring-OLE.
Dung Bui, Kelong Cong
2025Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions.
Yoshiaki Honda, Kazumasa Shinagawa
2025Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers.
Daniel Berend, Amit Cohen, Shahar Golan, Boris Tsirkin, Yochai Twitto, Itamar Zimerman
2025Faster FHEW Bootstrapping with Adaptive Key Update.
Qi Zhang, Mingqiang Wang, Xiaopeng Cheng
2025Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic.
Furqan Rustam, Islam Obaidat, Davide Di Monda, Anca Delia Jurcut
2025Fully Verifiable Ciphertext-Policy Attribute-Based Encryption.
Quoc-Bao Ninh, Cao Quang Phat, Tran Trung Dung
2025Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt.
Qingjie Hu, Zhen Liu, Yuchen Cao, Guanju Xiao, Jianhua Wang
2025Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption.
Yuto Imura, Keita Emura
2025Impossibility of Four-Card AND Protocols with a Single Closed Shuffle.
Shizuru Iino, Shota Ikeda, Kazumasa Shinagawa, Yang Li, Kazuo Sakiyama, Daiki Miyahara
2025Impossible Differential Attack on SAND-128.
Nobuyuki Sugio
2025Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirectional Tree-Structured Embedding Model.
Cong Cao, Xiaohan Wang, Shunda Pan, Guohang Shen, Haipeng Qu
2025On the Relations Between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search.
Takeshi Yoshida, Keita Emura
2025Revisiting Rational Broadcast Protocols.
Shunya Otomo, Kenji Yasunaga
2025Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs.
Amit Singh Bhati, Elena Andreeva, Simon Müller, Damian Vizár
2025Strong Designated Verifier Signatures from Isogeny Assumptions.
Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Yannan Li, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto
2025Synthetic Lateral Movement Data Generation for Azure Cloud: A Hopper-Based Approach.
Mohammad Mamun, Hadeer Ahmed, Anas Mabrouk, Sherif Saad
2025To Extend or Not to Extend: Agile Masking Instructions for PQC.
Markus Krausz, Georg Land, Florian Stolz, Jan Richter-Brockmann, Tim Güneysu
2025Unveiling the Critical Attack Path for Implanting Backdoors in Supply Chains: Practical Experience from XZ.
Mario Lins, René Mayrhofer, Michael Roland
2025What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs.
Stefano Simonetto, Ronan Oosteven, Thijs van Ede, Peter Bosch, Willem Jonker
2025WiperSentinel: HPC Based Wiper Detection with Enhanced AutoEncoder.
Shiva Agarwal, Suvadeep Hajra, Ayantika Chatterjee, Debdeep Mukhopadhyay
2025webSPDZ: Versatile MPC on the Web.
Thomas Buchsteiner, Karl W. Koch, Dragos Rotaru, Christian Rechberger