| | AsiaJCIS 2025: Author Index| Author | Papers | 
|---|
 | A |  | Asano, Kyoichi | A Generic Zero-Knowledge Range Argument with Preprocessing |  | C |  | Chen, Guan-Yu | Registered Key-Policy Attribute-Based Encryption |  | Chen, Wei-Rung | Circular Quantum Secret Sharing Based on SWAP Gates |  | E |  | Emura, Keita | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures
 |  | F |  | Fan, Chun-I | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |  | Furumoto, Keisuke | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |  | G |  | Guan, Albert | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |  | H |  | Hayashi, Mizuki | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester |  | Hirose, Kenjiro | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm |  | Huang, Jheng-Jia | Registered Key-Policy Attribute-Based Encryption |  | I |  | Igarashi, Yasutaka | Improved Integral Cryptanalysis on Reduced-Round Piccolo |  | Iwamoto, Mitsugu | A Generic Zero-Knowledge Range Argument with Preprocessing |  | J |  | Ji, Yeontae | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |  | K |  | Kao, Shih-Pei | Registered Key-Policy Attribute-Based Encryption |  | Kikuchi, Hiroaki | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |  | Kim, Hyungyeop | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |  | Kim, Kwangjo | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python |  | L |  | Lee, Yao Yu | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform |  | Liang, Hai | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |  | Liao, Tzu-Yu | Circular Quantum Secret Sharing Based on SWAP Gates |  | Lin, Iuon-Chang | Circular Quantum Secret Sharing Based on SWAP Gates |  | Lin, Jason | Circular Quantum Secret Sharing Based on SWAP Gates |  | Liu, Zi-Yuan | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model |  | Lu, Yi-Jiin | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption
 |  | M |  | Miura, Koki | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions |  | Miyaji, Atsuko | Key-Value Commitments with Unlinkability An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm
 Privacy-Preserving Attribute Domain Reconstruction for Machine Learning
 |  | Morikawa, Tomohiro | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |  | N |  | Nishino, Hinata | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |  | O |  | Okumura, Shinya | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm |  | Omote, Kazumasa | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures |  | P |  | Peng, Xinyong | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |  | Prabowo, Theo Fanuela | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |  | Praditasari, Wibby Aldryani Astuti | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |  | R |  | Rimbawa, Danang | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |  | S |  | Sasaki, Ayako | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |  | Sawai, Yuki | A Generic Zero-Knowledge Range Argument with Preprocessing |  | Shibayama, Naoki | Improved Integral Cryptanalysis on Reduced-Round Piccolo |  | T |  | Takahashi, Takeshi | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method |  | Tan, Chik How | Hamming Metric Code-Based Signature Scheme With Restricted Vectors |  | Tao, Wenkang | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |  | Tsai, Pei-Shiun | Circular Quantum Secret Sharing Based on SWAP Gates |  | Tsai, Tien-Lin | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption
 |  | Tseng, Yi-Fan | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model Registered Key-Policy Attribute-Based Encryption
 |  | Tsujimoto, Yuto | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning |  | Tsujimura, Towa | Key-Value Commitments with Unlinkability |  | W |  | Wang, Shuo | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |  | Wang, Wei-Hsueh | Registered Key-Policy Attribute-Based Encryption |  | Wang, Yujue | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |  | Watanabe, Yohei | A Generic Zero-Knowledge Range Argument with Preprocessing |  | X |  | Xu, Yu | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services |  | Y |  | Yi, Okyeon | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |  | Yoon, Hyejin | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks |  | You, Gunsang | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform |  | Youm, Heung Youl | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
 | 
 |