Accepted Papers:
DBridger: Discovering Vulnerable Data Sharing Paths in Embedded Firmware
Linyu Li, Lei Yu, Qingli Guo, Ruixuan Zhang, Can Yang, Jun Guan and Xiaorui Gong
ECGRQ-LI: Efficient Conjunctive Geometric Range Query over Encrypted Spatial Data with Learned Index
Mingyue Li and Yuting Zhu
An Improved Signal Leakage Attack Against DXL Key Exchange Protocol
Zhiwei Li, Jun Xu and Lei Hu
A Binary Code Similarity Detection Method Based on Cross-Modal Coordinated Representation Learning
Hongyu Yang, Yunlong Wang, Ze Hu and Xiang Cheng
Malware Detection Method Based on Multi-Dimensional Dynamic weighted alpha Image Fusion and Feature Enhancement
Lixia Xie, Chenyang Wei, Hongyu Yang, Ze Hu and Xiang Cheng
Lattice-Based Succinct Mercurial Functional Commitment for Boolean Circuits: Definitions, and Constructions
Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang and Min Xie
Formal Analysis of WAPI Authentication and Key Agreement Protocol
Zhongqi Lv, Hui Li, Haisong Ye, Chi Ma and Jingjing Guan
Extended Policy-based Sanitizable Signatures
Ismail Afia and Riham Altawy
Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method
Xinming Zhu, Shihui Zheng and Zihao Han
Generalized Cryptanalysis of Cubic Pell RSA
Hao Kang and Mengce Zheng
Solving Modular Linear Equations via Automated Coppersmith and its Applications
Yansong Feng, Zhen Liu, Abderrahmane Nitaj and Yanbin Pan
Clustering Coefficient Estimating of Distributed Graph Data based on Shuffled Differential Privacy
Hongfa Ding, Peiwang Fu, Heling Jiang and Xuesong Li
Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers
Jingsui Weng, Wentao Zhang, Ting Peng and Tianyou Ding
On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms
George Teseleanu
Hierarchical Functional Encryption for Quadratic Transformation
Jun Zhao, Kai Zhang, Junqing Gong and Haifeng Qian
Quantum Public-Key Encryption of Quantum States, and More
Tianshu Shan, Shujiao Cao and Rui Xue
Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage
Futai Zhang, Yichi Huang, Wenjie Yang and Jinmei Tian
A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT
Jiahao Zhao, Qianqian Yang, Ling Song and Lei Hu
TA-DPDP: Dynamic Provable Data Possession for Online Collaborative System with Tractable Anonymous
Chenchen Wu, Weijing You and Li Xu
HiddenStor: A Steganographic Storage System Built on Secret Sharing
Siyuan Ma, Yuewu Wang, Chunjing Kou, Peng Wang, Haotian Shi and Jiwu Jing
Committing Security of AEAD Based on Stream Cipher
Xueqi Zhu, Yan Jia, Jun Xu and Peng Wang
SIMD Optimizations of White-box Block Cipher Implementations with the Self-equivalence Framework
Luoqi Chen, Yufeng Tang, Liangju Zhao and Zheng Gong
Cube Attacks against Trivium, Kreyvium and ACORN with Practical Complexity
Yanqi Chen, Ting Li and Yao Sun
An Automatic Search Method For 4-bit S-box Towards Considering Cryptographic Properties and Hardware Area Simultaneously
Hongtao Hu, Chenhao Jia, Qing Ling, Sijia Gong, Ting Wu and Tingting Cui
On the Relationship between Public Key Primitives via Indifferentiability
Shuang Hu, Bingsheng Zhang, Cong Zhang and Kui Ren
EditPSM: A New Password Strength Meter Based on Password Reuse via Deep Learning
Yifei Zhang, Zhenduo Hou, Yunkai Zou, Zhen Li and Ding Wang
srCPace: Universally Composable PAKE with Subversion-Resilience
Jiahao Liu, Yi Wang, Rongmao Chen, Xincheng Tang and Jinshu Su
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning
Wenhao Xu and Hequn Xian
Efficient Privacy-Preserving Data Sharing Mechanisms Against Malicious Senders in Smart Grid
Jiangang Lu, Yunfan Yang, Qinqin Wu, Benhan Li and Mingxin Lu
Analyzing Decentralized Applications Traffic: A Multimodal Approach Based on GNN and BERT
Haoyang Lu, Rui Zhang and Tong Kong
How to Construct Public Timeline for RSA-formed Time-Lock Cryptography
Huixuan Jin, Cong Peng, Jintao Fu and Min Luo
NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets
Birou Gao, Rui Zhang, Yuting Xiao and Huan Zou
Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack
Boyun Li and Qun Liu
Efficient and Verifiable Multi-Server Framework for Secure Information Classification and Storage
Ziqing Guo, Yaohui Wang, Xuanyu Jin, Xiuhua Wang, Yuanyuan He and Yueyue Dai
Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and Twine
Jingwen Chen, Qun Liu, Boyun Li, Jingbo Qiao and Jinliang Wang
Revocable Registered attribute-based keyword search Supporting Fairness
Zongmin Wang, Qiang Wang, Fucai Zhou and Jian Xu
From Signature with Re-Randomizable Keys: Generic Construction of PDPKS
Ziyi Li, Ruida Wang, Xianhui Lu, Yao Cheng and Liming Gao
When Is Multi-Channel Better Than Single-Channel: A Case Study of Product-Based Multi-Channel Fusion Attacks
Shilong You, Jianfeng Du, Zhu Wang and Aimin Yu
Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations
Siyue Yao, Zhikang Xie and Man Ho Au
Revisiting Truncated Differential Attack from View of Equivalent Propagation Equations: Improved attacks on TWINE and LBlock
Shiqi Hou, Muzhou Li, Kai Hu, Shichang Wang and Bart Preneel
Conditional Accepted Papers:
Dynamic Collusion Bounded Public-Key Watermarking Schemes
Siyuan Yu, Ziqi Zhu, Rupeng Yang and Junqing Gong
CNNOVZKP: Convolutional Neural Network Model Ownership Verification with Zero-knowledge Proof
Yuhao Lian, Ying Ouyang and Deng Tang
Permutation Checks via Basis Transformation
Yu Wang
Attention-based Decompilation through Neural Machine Translation
Ruigang Liang and Ying Cao
Privacy-preserving Certificate-less Authenticated Key Exchange with Key Registration Privacy
Li Duan and Yong Li
Cryptanalysis of BAKSHEESH Block Cipher
Shengyuan Xu, Siwei Chen, Xiutao Feng, Zejun Xiang and Xiangyong Zeng
Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON
Taoyun Wang, Shuaiyu Chen, Lu Li and Weijia Wang