Read more
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17 20, 2025.
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.
List of contents
.- Post-Quantum Cryptography.
.- Compressed verification for post-quantum signatures with long-term public keys.
.- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its
Application in NTRUReEncrypt.
.- Strong Designated Verifier Signatures from Isogeny Assumptions.
.- To extend or not to extend: Agile Masking Instructions for PQC.
.- Symmetric-Key Cryptography.
.- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation.
.- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs.
.- Computing the restricted algebraic immunity, and application to WPB functions.
.- Multi-Party Computation.
.- Efficient Fuzzy Labeled PSI from Vector Ring-OLE.
.- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with
Partial-Open Actions.
.- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle.
.- webSPDZ: Versatile MPC on the Web.
.- Advanced Encryption.
.- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption.
.- On the Relations between Matchmaking Public Key Encryption and Public Key
Authenticated Encryption with Keyword Search.
.- Faster FHEW Bootstrapping with Adaptive Key Update.
.- Cryptographic Protocols and Blockchain.
.- Attribute-based Key Exchange with Optimal Efficiency.
.- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity.
.- Decentralized Fair Exchange with Advertising.
.- Revisiting Rational Broadcast Protocols.
.- Vulnerability Detection.
.- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder.
.- Attention-based Code Summarization for Multi-label Vulnerability Detection.
.- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model.
.- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE
Mapping with LLMs.
.- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text.
.- Attacks.
.- Unveiling the critical attack path for implanting backdoors in supply chains:
Practical experience from XZ.
.- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach.
.- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns.
.- Short Papers.
.- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers.
.- DiSK: A Deniable Split KEM from The MLWE Problem.
.- A Key-Update Mechanism for the Space Data Link Security Protocol.
.- Automated Verification of Proofs in the Universal Composability Framework
with Markov Decision Processes.
.- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption.
.- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic.
.- Impossible Differential Attack on SAND-128.
Summary
This book constitutes the proceedings from the 24th International Conference on Cryptology and Network Security, CANS 2025, held in Osaka, Japan during November 17–20, 2025.
The 26 full papers and 7 short papers were carefully reviewed and selected from 81 submissions. They are organized in topical sections as follows: Post-Quantum Cryptography; Symmetric-Key Cryptography; Multi-Party Computation; Advanced Encryption; Cryptographic Protocols and Blockchain; Vulnerability Detection; and Attacks.