AsiaJCIS 2025: BibTeX Entries

Volume

@proceedings{AsiaJCIS2025,
  title     = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  year      = {2025}}

Papers

@inproceedings{AsiaJCIS2025:Generic_Zero_Knowledge_Range,
  author    = {Yuki Sawai and Kyoichi Asano and Yohei Watanabe and Mitsugu Iwamoto},
  title     = {A Generic Zero-Knowledge Range Argument with Preprocessing},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/xs8k1},
  doi       = {10.29007/4v7f},
  pages     = {1-15},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Key_Value_Commitments_with,
  author    = {Towa Tsujimura and Atsuko Miyaji},
  title     = {Key-Value Commitments with Unlinkability},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/KMNp},
  doi       = {10.29007/8ssm},
  pages     = {16-30},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Security_Analysis_Public_Key,
  author    = {Mizuki Hayashi and Keita Emura},
  title     = {Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/KqwW},
  doi       = {10.29007/126n},
  pages     = {31-39},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Attack_Ring_LWE_Using,
  author    = {Kenjiro Hirose and Shinya Okumura and Atsuko Miyaji},
  title     = {An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/F3qC},
  doi       = {10.29007/8v1z},
  pages     = {40-54},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Hamming_Metric_Code_Based,
  author    = {Chik How Tan and Theo Fanuela Prabowo},
  title     = {Hamming Metric Code-Based Signature Scheme With Restricted Vectors},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/Q3hd},
  doi       = {10.29007/d743},
  pages     = {55-69},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Circular_Quantum_Secret_Sharing,
  author    = {Pei-Shiun Tsai and Tzu-Yu Liao and Wei-Rung Chen and Jason Lin and Iuon-Chang Lin},
  title     = {Circular Quantum Secret Sharing Based on SWAP Gates},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/BjTF},
  doi       = {10.29007/9lzf},
  pages     = {70-83},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Traceable_Cross_Domain_Anonymous,
  author    = {Hai Liang and Wenkang Tao and Yujue Wang and Shuo Wang and Yu Xu and Xinyong Peng},
  title     = {Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/rNZj},
  doi       = {10.29007/5mk1},
  pages     = {84-98},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Improved_Integral_Cryptanalysis_Reduced,
  author    = {Naoki Shibayama and Yasutaka Igarashi},
  title     = {Improved Integral Cryptanalysis on Reduced-Round Piccolo},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/RPLD},
  doi       = {10.29007/866h},
  pages     = {99-113},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Phishing_Attack_Simulation_Detection,
  author    = {Yao Yu Lee and Albert Guan},
  title     = {Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/WK6X},
  doi       = {10.29007/58hg},
  pages     = {114-121},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Tightly_Secure_Public_Key,
  author    = {Yi-Fan Tseng and Yi-Jiin Lu and Tien-Lin Tsai and Zi-Yuan Liu},
  title     = {Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/5zBD},
  doi       = {10.29007/f9gd},
  pages     = {122-132},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:HybridNTT_Lightweight_Learning_Based,
  author    = {Gunsang You and Yeontae Ji and Heung Youl Youm},
  title     = {HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/9X6P},
  doi       = {10.29007/fdll},
  pages     = {133-143},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Smart_Contract_Based_Non,
  author    = {Hinata Nishino and Kazumasa Omote and Keita Emura},
  title     = {A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/LbXR},
  doi       = {10.29007/fbsx},
  pages     = {144-154},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Registered_Key_Policy_Attribute,
  author    = {Shih-Pei Kao and Yi-Fan Tseng and Tien-Lin Tsai and Yi-Jiin Lu and Jheng-Jia Huang and Guan-Yu Chen and Wei-Hsueh Wang},
  title     = {Registered Key-Policy Attribute-Based Encryption},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/LzGd},
  doi       = {10.29007/tjfx},
  pages     = {155-164},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Privacy_Preserving_Attribute_Domain,
  author    = {Yuto Tsujimoto and Atsuko Miyaji},
  title     = {Privacy-Preserving Attribute Domain Reconstruction for Machine Learning},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/2SPc},
  doi       = {10.29007/4l54},
  pages     = {165-175},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:AI_Driven_Defense_Mechanism,
  author    = {Wibby Aldryani Astuti Praditasari and Hyungyeop Kim and Hyejin Yoon and Danang Rimbawa and Okyeon Yi},
  title     = {AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/rC5W},
  doi       = {10.29007/qxrb},
  pages     = {176-186},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Comparison_Post_Quantum_Signatures,
  author    = {Kwangjo Kim},
  title     = {Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/kvxx},
  doi       = {10.29007/wh4q},
  pages     = {187-198},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:No_Anonymity_Metaverse_VR,
  author    = {Koki Miura and Hiroaki Kikuchi},
  title     = {No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/24lC},
  doi       = {10.29007/l3dj},
  pages     = {199-209},
  year      = {2025}}


@inproceedings{AsiaJCIS2025:Lightweight_Accurate_Classification_Framework,
  author    = {Ayako Sasaki and Takeshi Takahashi and Keisuke Furumoto and Chun-I Fan and Tomohiro Morikawa},
  title     = {A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method},
  booktitle = {Proceedings of the 20th Asia Joint Conference on Information Security},
  editor    = {Akira Yamada and Huy Kang Kim and Yujue Wang and Tung-Tso Tsai},
  series    = {EPiC Series in Computing},
  volume    = {106},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/zZlP},
  doi       = {10.29007/s3f6},
  pages     = {210-220},
  year      = {2025}}