| Hayato Arai |
Secure against side-channel attack and fast post-quantum crypto system CSIDH |
| Shingo Uehara |
Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation |
| Yuya Okubo |
A Proposal of defining fields for Efficient Ring-LWE Based Cryptography |
| Junpei Ozaki |
Proposal for operation verification framework and debugger for eBPF |
| Fumiya Saito |
Design and implementation of Trusted shell on TEE |
| Tomoka Takahashi |
Vulnerability of Ring-LWE problem due to error bias |
| Yoshitaka Nagao |
Privacy Preserving Threshold Data Integration Protocol |
| Koki Matsubara |
Proposal for a hash function with keys that reduces the risk of secret key leakage |
| Ryo Watanabe |
Improved differential linear analysis for the symmetric key cipher ChaCha |
| Wang Yusen |
Dealer-less Threshold Signature Schemes based on Isogeny |
| Li Jun Ru |
Security Analysis on Stream Cipher Salsa20 |
| Gao Yue |
Security Anslysis of Scalar multiplication Algorithm on GLS254 |