ACISP 2026
Accepted Papers
Round 1 Submissions
Analyzing Forgery Security of LeMac: Tight Bounds and Impact of Padding
Taichi Nagoya, Takuro Shiraya, Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Ryoma Ito, and Takanori Isobe
Automated Tool for Finding Practical Collisions on SPN-based Hash Functions
Keita Toyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Kodai Taiyama, and Takanori Isobe
CogSpy: Cognition-Driven PIN Inference against Layout-Randomized Soft Keyboards
Chiyu Zhou, Zijian Wan, and Wei Wang
Compact All-but-τ Vector Commitments for MPC-in-the-Head Signatures
Lingqing Zhao and Liping Wang
Cryptanalytic Extraction of Convolutional Neural Networks
Xiaohan Sun, Hao Lei, Longxiang Wei, Xiaokang Qi, Kai Hu, Meiqin Wang, and Wei Wang
Detection and Interpretation of Malicious Network Traffic via a novel 8-Channel Image Representation
Zhiqiang Wang, Junlai Luo, Sen Teng, and Sicheng Yuan
Efficient Identity-Based Matchmaking Encryption with Enhanced Privacy and Chosen-Ciphertext Security
Qinyi Li, Hao Qin, and Xavier Boyen
Efficient Zero Knowledge Proofs for Committed Symmetric Boolean Functions From VOLE-in-the-Head
Ying Ouyang, Zuming Liu, Deng Tang, and Yanhong Xu
Enhancing Backdoor Persistence under Uncontrolled Federated Clients: A Bidirectional Adversarial and Redundant Embedding Framework
Lin Wei, Zitao Lyu, Lei Shi, Chengming Liu, and Huijuan Lian
Improved Tightly Secure (ID-based) Signatures in the AGM
Yanzibo Zhou, Fuchun Guo, Willy Susilo, and Nan Li
Information-Theoretic Privacy for Long-Term Share Storage on Noisy Media
Elmo Huang, Huaxiong Wang, and Kwok Yan Lam
Meet-LWE with Hints: Solving Ternary LWE with Information Leakage
Jinzheng Cao, Rongmao Chen, Haodong Jiang, and Qingfeng Cheng
Missing the Link? Enhancing the Security of Digital Car Keys With Secure Session Linking and Hardware Trust
Christian Plappert and Daniel Trick
Multi-Authority Attribute-Based Anonymous Credentials with Public Traceability and Revocation
Meng Sun, Mingmei Zheng, Junzuo Lai, Chi Wu, and Xiaohan Mo
Okara: Detection and Attribution of TLS Man-in-the-Middle Vulnerabilities in Android Apps with Foundation Models
Haoyun Yang, Ronghong Huang, Yong Fang, Beizeng Zhang, Junpu Guo, Zhanyu Wu, and Xianghang Mi
Prompt to Pwn: Automated Exploit Generation for Smart Contracts
Zeke Xiao, Qin Wang, Yuekang Li, and Shiping Chen
RC-MDNet: Risk-Controlled Malicious Domain Detection for Open-World Network Security
Yuning Jing
Retention-Consistent Concept Unlearning for Diffusion Models
Laiqiao Qin, Tianqing Zhu, Linlin Wang, and Wanlei Zhou
Robust Encrypted Video Identification in the Mixed-Segment Era: A Retrieval-Augmented Approach
Jia Yee Tan, Yiqiao Zhou, and Liu Xutong
Secure Sealed-bidding Networks via Conditional Time-aware Access Authorization
Qi Liu, Peng Jiang, Yimin Liu, Zhen Zhao, and Liehuang Zhu
ServiceChain: A Verifiable Cloud Service Framework for Resource-Constrained Blockchain Nodes
Lin Zhang, Shaowen Yao, Jiayuan Lv, Huajian Yu, and Hongxing Xu
Shielding MCP Tool: A Secure Execution Framework using TEE and Automated Trimming
Ruidong Han, Chengyan Ma, Ye Liu, Yuqing Niu, and David Lo
ST-Mamba: Spatio-temporal Feature-Based Encrypted Traffic Analysis Using Mamba Network
Jiangwen Zhu, Mingrui Fan, Ruohan Cao, Jinxin Zuo, and Yueming Lu
The Dark Side of Upgrades: Uncovering Insecurity in Smart Contract Upgrades
Dingding Wang, Jianting He, Siwei Wu, Yajin Zhou, Lei Wu, and Cong Wang
TIDE: Making Task-Agnostic Backdoors Harder to Erase in Pre-trained Language Models
Yan Meng, Zhigang Lu, Bing Li, Anan Du, and Shuchao Pang
Towards Public Tracing: Collaborative Traceable Secret Sharing
Pousali Dey, Rittwik Hajra, Subha Kar, and Soumit Pal
Transparent Fully Batchable Polynomial Commitment with Application to Scalable VSS
Xiangyu Kong, Min Zhang, and Yu Chen
Round 2 Submissions
A Taxonomy-Driven Case Study of Australian Web Resources Against Technology-Facilitated Abuse
Dipankar Srirag, Xiaolin Cen, Rahat Masood and Aditya Joshi
Adversarial-Example Agnostic Detection in Network Intrusion Detection Systems
Jing Li, Wei Zong, Yang-Wai Chow and Willy Susilo
Attribute-Based Encryption for Circuits and Inner-Product Predicate Encryption from Middle-Product LWE
Takumi Nishimura and Atsushi Takayasu
Autonomous Adversary: Red-Teaming in the age of LLM
Mohammad Mamun, Mohamed Hatem, Sherif Saad and Scott Buffett
Backdoor Risks in Personalized Federated Learning under Practical Constraints
Yiming He, Qing Ye, Xinhong Hei and Yichuan Wang
Batch-Puncturing Circuit CP-ABE (and More) from Lattices
Yongkang Lang, Fangguo Zhang, Jianghong Wei, Xinyi Huang and Xiaofeng Chen
Beyond the U-Method: Automating the Search for UID-Based Contradictions with Constraint Programming
Jinpeng Liu and Ling Sun
Contact Tracing with Location Privacy Protection
Xun Yi, Xiaoning Liu, Kwok-Yan Lam and Elisa Bertino
CSC: Turning the Adversary’s Poison against Itself
Yuchen Shi, Xin Guo, Huajie Chen, Tianqing Zhu, Bo Liu and Wanlei Zhou
Data Exfiltration over Browsers
Naseer Ahmad Noor, Masahiro Ishii and Keisuke Tanaka
Efficient Additive Randomized Encodings for String Oblivious Transfer: A Core Primitive for General Functions
Masaya Yoshimura, Kyoichi Asano, Yugo Kasashima, Mitsugu Iwamoto and Yohei Watanabe
Empirical Analysis of Misdirected Payment Risks from Name Collisions in Blockchain Naming Services
Soichiro Kobayashi, Daiki Ito, Takuya Watanabe, Yuta Takata, Hiroshi Kumagai and Masaki Kamizono
Ensuring Incentive Compatibility in an Enhanced All-Pay Auction Model for User Recruitment
Hai Liu, Nana Zhou, Maoze Tian, Ying Tang and Jianfeng Ma
Evaluating SAT Accelerations for Cryptanalytic Trail Search - Low-Parallelism Portfolio Parallelism and A Comparison of Matsui-Based Methods
Tenglong Yuan, Bingqing Li and Ling Sun
Fast Updatable Message Authentication Codes and Signatures with Public Tokens
Marc Fischlin and Saçıak Gözde
Fine-Grained Weighted Access Control with Keyword Search and Malicious User Tracing for Cloud-Based mHealth Systems
Jiannan Wei, Zhipeng Zhai, Mingxin Lu and Xuansong Li
Forward-Secure Tag-Inverse Puncturable Identity-Based Encryption
Dongmei Yang, Yang Ba, Xuexian Hu and Jianghong Wei
Harnessing Large Language Models for Real-Time Cyber Threat Detection and Response: A Comprehensive Survey
Xiaoyu Li, Nan Sun and Jiaojiao Jiang
HetAKE: Heterogeneous Authenticated Key Exchange for Post-Quantum Migration
Xianhui Lu, Yao Cheng, Jingnan He, Haiyang Xue and Yamin Liu
Knowledge Graph–Augmented Reasoning for Robust Multi-Modal Document Attack Detection
Teng Li, Shengkai Zhang, Jia Tian, Yebo Feng, Li Yan, Zhuo Ma and Jianfeng Ma
Lattice-based Ring Verifiable Random Functions
Jie Xu, Muhammed F. Esgin and Ron Steinfeld
Laurent Polynomial-Based Linear Transformations for Improved Functional Bootstrapping
San Ling, Benjamin Hong Meng Tan, Huaxiong Wang and Allen Siwei Yang
LockMeld: A Privacy-Preserving Cross-Chain Protocol for Confidential, Account-Based Blockchains
Hanqing Huang, Chenke Wang, Yu Long, Xian Xu and Dawu Gu
Lost in the Pages: WebAssembly Code Recovery through SEV-SNP’s Exposed Address Space
Markus Berthilsson and Christian Gehrmann
LRC-DPoR: Efficient Data Integrity Auditing with Local Repair and Dynamic Updates
Yumei Li, Willy Susilo, Fuchun Guo and Yudi Zhang
MelShield: Robust Mel-Domain Audio Watermarking for Provenance Attribution of AI Generated Synthesized Speech
Yutong Jin, Qi Li, Lingshuang Liu and Jianbing Ni
OblivSage: Oblivious Graph Sampling for Privacy-Preserving GNN
Zhibo Xu, Yiming Qin, Shangqi Lai, Xiaoning Liu, Alsharif Abuadbba, Tsz Hon Yuen, Joseph Liu and Xingliang Yuan
Password Protected Universal Thresholdizer
Sabyasachi Dutta, Partha Sarathi Roy, Reihaneh Safavi-Naini and Willy Susilo
PhishCascade: Confidence-Gated Multi-Agent Phishing Detection
Hongju Li
Pixel-Depth Prototypical Knowledge Consolidation Network for Deepfake Detection
Ahmed Asiri, Weiqi Wang, Zhiyi Tian, Xiaoyu Ding, Luoyu Chen and Shui Yu
Related-key Secure Blockwise Universal Permutations and Non-linear SPNs
Yuxiang Wang and Chun Guo
RoS-ETA: Defeating Availability Poisoning via the Physical Rate Paradox
Chaoqiang Fu, Daofeng Li, Guoxiong Huang and Wanjing Lu
Round-Optimal Threshold Blind Signature from Lattices
Haoqi Zhang, Qinyi Li, Leo Yu Zhang and Hui Tian
Scrutinising Parametric Distance Verification in Unlearning: A Coupling Perspective
Jingming Dai, Lulu Xue, Jintian Ji, Yanjun Zhang, Shengshan Hu and Leo Yu Zhang
Seeing Data Rights: Understanding of Pictograms and Color Cues for Privacy and Complex Data Practices
Kira Mennerich, Mia Catharina Chrambach, Maya Laura Gohres, Omed Abed, Patrick-Benjamin Bök and Matteo Große-Kampmann
ShellMamba: Anomaly Detection of Shell Command Sequences
Qiwei Zong, Yongqiang Dong, Shishun Zhu and Xingshen Wei
SoK: Telemetry-Aware Runtime Assurance for Always-On On-Device Intrusion Detection
Nuonan Ouyang, Adrian Shatte, Zhigang Lu, Chao Chen and Wei Xiang
SoK: The Cryptanalysis of SHA-3 Standard
Hailun Yan, Anze Sun, Jiahao Wang and Zheng Li
SpecGate: Spectral Decomposition and LOF-Gated Aggregation for Defending Against Backdoor Attacks in Federated Learning
Wenxiu Wu, Haiyong Bao, Menghong Guan, Jiaan Jiang, Hong-Ning Dai and Cheng Huang
ST-Attention-XAI: Intrinsic Spatio-Temporal Explainability for IoT Intrusion Detection via Attention Analysis
Nimesha Dilini, Nan Sun, Yuantian Miao and Nour Moustafa
Threshold FHE with Short Decryption Shares without a Semi-trusted Server
Hiroki Okada and Tsuyoshi Takagi
Understanding the Security of Cloud Storage Services: A Case Study and UC-Secure Design
Pengfei Wu, Yuxian Li, Lisha Yao, Xiaoguo Li, Guomin Yang, Tao Xiang and Robert H. Deng
Verifiable Anomaly and Similarity Detection Using Matrix Profile in Private Time-series
Xavier Bultel, Charlène Jojon, Benjamin Nguyen and Haoying Zhang
Industry Track
6Digger: An IPv6 Target Generation Algorithm Based on Address Pattern Mining
Hongtao Zhang, Luyang Li, Liancheng Zhang, Shunlong Hao, Haojie Zhu, Ce Sun and Yangxiang Zhou
BRACE: Risk-Driven Dynamic Threshold Authorization for Cross-Chain Bridges
Zhongyuan Yuan, Qi Xia, Jianbin Gao and Hu Xia
Breaking and Fixing Spoed
Yan Jia, Peng Wang, Lei Hu, Gang Liu, Tingting Guo and Shuping Mao
CP-SpartanDL: An Efficient CP-zkSNARK in The Discrete Log Setting
Xuangang Yan, Zibo Zhou and Zongyang Zhang
Decentralized Biometric Authentication via Threshold-Based Key Derivation
Haoze Cheng, Hui Cui and James Boorman
Efficient Homomorphic String Search via TFHE
Shintaro Narisada, Hiroki Okada, Takashi Nishide and Kazuhide Fukushima
FedSOAR: Robust Federated Learning via Dual-Metric Graph Topology and Directional Alignment
Yanyu Tong, Changrui Zheng, Wenye Xing and Jiageng Chen
Hiding the Heartbeat: $\mathcal{O}(1)$ Privacy-Preserving Proof of Aliveness for Critical IoT
Harishma Boyapally and Jianying Zhou
Physics-Informed Residual Learning for Channel-Robust LoRa Radio Frequency Fingerprinting
Elisée Toe, Laurent Ferrier and Fehmi Jaafar
Privacy Risk Assessment Framework for Information System
Raisa Islam and Dongwan Shin
SGX-QKMS: Remotely Attested Key Relaying in Quantum Key Distribution Networks
Krišjānis Petručeņa, Sergejs Kozlovičs, Juris Vīksna, Elīna Kalniņa, Edgars Celms, Edgars Rencis, Rihards Balodis and Ināra Opmane
SoK: A Comprehensive Security Analysis of Jailbreak Resilience in GPT and DeepSeek Models
Xiaodong Wu, Xiangman Li, Qi Li, Lingshuang Liu and Jianbing Ni
$\Sigma$-Orchestra: A Harmonized Lattice-based $\Sigma$-Protocol for Polynomial Relations with Exact $\ell_2$-Soundness
Lizhen Zhang, Shang Gao and Bin Xiao
The Related Key Boomerang Attack on ChaCha Permutation Function
Nasratullah Ghafoori and Atsuko Miyaji




