| a | 
| Anonymous | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | 
| attribute-based encryption | Registered Key-Policy Attribute-Based Encryption | 
| Autoencoder-Based Security | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | 
| b | 
| Biometrics | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | 
| BKW Algorithm | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | 
| block cipher | Improved Integral Cryptanalysis on Reduced-Round Piccolo | 
| Blockchain | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | 
| c | 
| Circular Transmission | Circular Quantum Secret Sharing Based on SWAP Gates | 
| code-based cryptography | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | 
| commitment | A Generic Zero-Knowledge Range Argument with Preprocessing | 
| cross-domain authentication | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | 
| Cryptanalysis | Improved Integral Cryptanalysis on Reduced-Round Piccolo | 
| d | 
| data privacy | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | 
| DDH | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | 
| designated tester | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | 
| dynamic optimization | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
| Dynamic Time Warping | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | 
| e | 
| Execution Path Prediction | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
| f | 
| Falcon | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | 
| feature representation | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | 
| Flexible Authorization | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | 
| g | 
| gait authentication | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | 
| GPV Framework | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | 
| h | 
| Hamming metric QC codes | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | 
| higher-order differential attack | Improved Integral Cryptanalysis on Reduced-Round Piccolo | 
| Hybrid NTT | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
| i | 
| insert | Key-Value Commitments with Unlinkability | 
| Integral attack | Improved Integral Cryptanalysis on Reduced-Round Piccolo | 
| k | 
| Key escrow problem | Registered Key-Policy Attribute-Based Encryption | 
| Key-Value Commitments | Key-Value Commitments with Unlinkability | 
| l | 
| lattice-based cryptography | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python
 | 
| Lightweight Real-Time Defense | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | 
| local differential privacy | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning | 
| m | 
| machine learning | Privacy-Preserving Attribute Domain Reconstruction for Machine Learning A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method
 | 
| n | 
| Nominative signatures | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | 
| non-transferability | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | 
| NTT | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
| Number Theoretic Transform | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
| o | 
| Oblivious Accumulators | Key-Value Commitments with Unlinkability | 
| p | 
| Phishing | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | 
| Phishing Detection | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | 
| phishing simulation | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | 
| Piccolo | Improved Integral Cryptanalysis on Reduced-Round Piccolo | 
| post-quantum cryptography | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks
 | 
| Post-quantum signature | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | 
| Predicate Encoding | Registered Key-Policy Attribute-Based Encryption | 
| Privacy | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | 
| Public key encryption with equality test | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | 
| Public Key Encryption with Keyword Search | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | 
| Python Implementation | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | 
| q | 
| quantum secret sharing | Circular Quantum Secret Sharing Based on SWAP Gates | 
| r | 
| Registration-based encryption | Registered Key-Policy Attribute-Based Encryption | 
| Ring-LWE | An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm | 
| s | 
| Side-Channel Attack Detection | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | 
| signature | Hamming Metric Code-Based Signature Scheme With Restricted Vectors | 
| single photons | Circular Quantum Secret Sharing Based on SWAP Gates | 
| smart contract | A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures | 
| SMOTE | HybridNTT: A Lightweight Learning-Based Dynamic Path Selection Framework for Fast Number Theoretic Transform | 
| Social Engineering | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | 
| SOLMAE | Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python | 
| standard model | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | 
| SWAP gates | Circular Quantum Secret Sharing Based on SWAP Gates | 
| Symmetric Pairing | Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester | 
| t | 
| Tight security | Tightly Secure Public-Key Encryption with Equality Test Supporting Flexible Authorization in the Standard Model | 
| traffic log classification | A Lightweight and Accurate Classification Framework for Traffic Log Analysis Based on an Effective Feature Representation Method | 
| Trojan-horse attacks | Circular Quantum Secret Sharing Based on SWAP Gates | 
| u | 
| unlinkability | Key-Value Commitments with Unlinkability | 
| Unsupervised Anomaly Detection | AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks | 
| update | Key-Value Commitments with Unlinkability | 
| URL | Phishing Attack Simulation and Detection Strategies: A Case Study on NTNU Moodle Platform | 
| v | 
| Vehicle Fog Services | Traceable Cross-Domain Anonymous Authentication for Distributed Vehicular Fog Computing Services | 
| Virtual Reality | No Anonymity in Metaverse: VR User Identification Based on DTW Distance of Head-and-Arms Motions | 
| VOLE-based ZKP | A Generic Zero-Knowledge Range Argument with Preprocessing | 
| z | 
| Zero-knowledge range argument | A Generic Zero-Knowledge Range Argument with Preprocessing |