Hayato Arai |
Secure against side-channel attack and fast post-quantum crypto system CSIDH |
Shingo Uehara |
Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation |
Yuya Okubo |
A Proposal of defining fields for Efficient Ring-LWE Based Cryptography |
Junpei Ozaki |
Proposal for operation verification framework and debugger for eBPF |
Fumiya Saito |
Design and implementation of Trusted shell on TEE |
Tomoka Takahashi |
Vulnerability of Ring-LWE problem due to error bias |
Yoshitaka Nagao |
Privacy Preserving Threshold Data Integration Protocol |
Koki Matsubara |
Proposal for a hash function with keys that reduces the risk of secret key leakage |
Ryo Watanabe |
Improved differential linear analysis for the symmetric key cipher ChaCha |
Wang Yusen |
Dealer-less Threshold Signature Schemes based on Isogeny |
Li Jun Ru |
Security Analysis on Stream Cipher Salsa20 |
Gao Yue |
Security Anslysis of Scalar multiplication Algorithm on GLS254 |