| a |
| Anonymous | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
| attribute-based encryption | Registered Key-Policy Attribute-Based Encryption |
| Autoencoder-Based Security | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
| b |
| Biometrics | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
| BKW Algorithm | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm |
| block cipher | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
| Blockchain | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
| c |
| Circular Transmission | Circular Quantum Secret Sharing Based on SWAP Gates |
| code-based cryptography | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |
| commitment | A Generic Zero-Knowledge Range Argument with Preprocessing |
| cross-domain authentication | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
| Cryptanalysis | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
| d |
| data privacy | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning |
| DDH | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
| designated tester | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
| dynamic optimization | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
| Dynamic Time Warping | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
| e |
| Execution Path Prediction | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
| f |
| Falcon | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
| feature representation | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |
| Flexible Authorization | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
| g |
| gait authentication | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
| GPV Framework | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
| h |
| Hamming metric QC codes | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |
| higher-order differential attack | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
| Hybrid NTT | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
| i |
| insert | Key-Value Commitments with Unlinkability |
| Integral attack | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
| k |
| Key escrow problem | Registered Key-Policy Attribute-Based Encryption |
| Key-Value Commitments | Key-Value Commitments with Unlinkability |
| l |
| lattice-based cryptography | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
| Lightweight Real-Time Defense | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
| local differential privacy | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning |
| m |
| machine learning | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |
| n |
| Nominative signatures | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |
| non-transferability | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |
| NTT | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
| Number Theoretic Transform | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
| o |
| Oblivious Accumulators | Key-Value Commitments with Unlinkability |
| p |
| Phishing | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
| Phishing Detection | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
| phishing simulation | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
| Piccolo | Improved Integral Cryptanalysis on Reduced-Round Piccolo |
| post-quantum cryptography | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
| Post-quantum signature | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
| Predicate Encoding | Registered Key-Policy Attribute-Based Encryption |
| Privacy | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
| Public key encryption with equality test | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
| Public Key Encryption with Keyword Search | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
| Python Implementation | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
| q |
| quantum secret sharing | Circular Quantum Secret Sharing Based on SWAP Gates |
| r |
| Registration-based encryption | Registered Key-Policy Attribute-Based Encryption |
| Ring-LWE | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm |
| s |
| Side-Channel Attack Detection | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
| signature | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |
| single photons | Circular Quantum Secret Sharing Based on SWAP Gates |
| smart contract | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |
| SMOTE | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |
| Social Engineering | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
| SOLMAE | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |
| standard model | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
| SWAP gates | Circular Quantum Secret Sharing Based on SWAP Gates |
| Symmetric Pairing | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |
| t |
| Tight security | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |
| traffic log classification | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |
| Trojan-horse attacks | Circular Quantum Secret Sharing Based on SWAP Gates |
| u |
| unlinkability | Key-Value Commitments with Unlinkability |
| Unsupervised Anomaly Detection | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |
| update | Key-Value Commitments with Unlinkability |
| URL | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |
| v |
| Vehicle Fog Services | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |
| Virtual Reality | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |
| VOLE-based ZKP | A Generic Zero-Knowledge Range Argument with Preprocessing |
| z |
| Zero-knowledge range argument | A Generic Zero-Knowledge Range Argument with Preprocessing |