AsiaJCIS 2025: Keyword Index

KeywordPapers
a
AnonymousTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
attribute-based encryptionRegistered Key-Policy Attribute-Based Encryption
Autoencoder-Based SecurityAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
b
BiometricsNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
BKW AlgorithmAn Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
block cipherImproved Integral Cryptanalysis on Reduced-Round Piccolo
BlockchainTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
c
Circular TransmissionCircular Quantum Secret Sharing Based on SWAP Gates
code-based cryptographyHamming Metric Code-Based Signature Scheme With Restricted Vectors
commitmentA Generic Zero-Knowledge Range Argument with Preprocessing
cross-domain authenticationTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
CryptanalysisImproved Integral Cryptanalysis on Reduced-Round Piccolo
d
data privacyPrivacy-Preserving Attribute Domain Reconstruction for Machine Learning
DDHSecurity Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
designated testerSecurity Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
dynamic optimizationHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
Dynamic Time WarpingNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
e
Execution Path PredictionHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
f
FalconComparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
feature representationA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
Flexible AuthorizationTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
g
gait authenticationNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
GPV FrameworkComparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
h
Hamming metric QC codesHamming Metric Code-Based Signature Scheme With Restricted Vectors
higher-order differential attackImproved Integral Cryptanalysis on Reduced-Round Piccolo
Hybrid NTTHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
i
insertKey-Value Commitments with Unlinkability
Integral attackImproved Integral Cryptanalysis on Reduced-Round Piccolo
k
Key escrow problemRegistered Key-Policy Attribute-Based Encryption
Key-Value CommitmentsKey-Value Commitments with Unlinkability
l
lattice-based cryptographyAn Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
Lightweight Real-Time DefenseAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
local differential privacyPrivacy-Preserving Attribute Domain Reconstruction for Machine Learning
m
machine learningPrivacy-Preserving Attribute Domain Reconstruction for Machine Learning
A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
n
Nominative signaturesA Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
non-transferabilityA Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
NTTHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
Number Theoretic TransformHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
o
Oblivious AccumulatorsKey-Value Commitments with Unlinkability
p
PhishingPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
Phishing DetectionPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
phishing simulationPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
PiccoloImproved Integral Cryptanalysis on Reduced-Round Piccolo
post-quantum cryptographyAn Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
Post-quantum signatureComparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
Predicate EncodingRegistered Key-Policy Attribute-Based Encryption
PrivacyNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
Public key encryption with equality testTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
Public Key Encryption with Keyword SearchSecurity Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
Python ImplementationComparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
q
quantum secret sharingCircular Quantum Secret Sharing Based on SWAP Gates
r
Registration-based encryptionRegistered Key-Policy Attribute-Based Encryption
Ring-LWEAn Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
s
Side-Channel Attack DetectionAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
signatureHamming Metric Code-Based Signature Scheme With Restricted Vectors
single photonsCircular Quantum Secret Sharing Based on SWAP Gates
smart contractA Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
SMOTEHybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform
Social EngineeringPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
SOLMAEComparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
standard modelTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
SWAP gatesCircular Quantum Secret Sharing Based on SWAP Gates
Symmetric PairingSecurity Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester
t
Tight securityTightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model
traffic log classificationA Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
Trojan-horse attacksCircular Quantum Secret Sharing Based on SWAP Gates
u
unlinkabilityKey-Value Commitments with Unlinkability
Unsupervised Anomaly DetectionAI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
updateKey-Value Commitments with Unlinkability
URLPhishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform
v
Vehicle Fog ServicesTraceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services
Virtual RealityNo Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions
VOLE-based ZKPA Generic Zero-Knowledge Range Argument with Preprocessing
z
Zero-knowledge range argumentA Generic Zero-Knowledge Range Argument with Preprocessing