ACISP 2026
Accepted Papers
Round 1 Submissions
Analyzing Forgery Security of LeMac: Tight Bounds and Impact of Padding
Taichi Nagoya, Takuro Shiraya, Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Ryoma Ito, and Takanori Isobe
Automated Tool for Finding Practical Collisions on SPN-based Hash Functions
Keita Toyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Kodai Taiyama, and Takanori Isobe
CogSpy: Cognition-Driven PIN Inference against Layout-Randomized Soft Keyboards
Chiyu Zhou, Zijian Wan, and Wei Wang
Compact All-but-τ Vector Commitments for MPC-in-the-Head Signatures
Lingqing Zhao and Liping Wang
Cryptanalytic Extraction of Convolutional Neural Networks
Xiaohan Sun, Hao Lei, Longxiang Wei, Xiaokang Qi, Kai Hu, Meiqin Wang, and Wei Wang
Detection and Interpretation of Malicious Network Traffic via a novel 8-Channel Image Representation
Zhiqiang Wang, Junlai Luo, Sen Teng, and Sicheng Yuan
Efficient Identity-Based Matchmaking Encryption with Enhanced Privacy and Chosen-Ciphertext Security
Qinyi Li, Hao Qin, and Xavier Boyen
Efficient Zero Knowledge Proofs for Committed Symmetric Boolean Functions From VOLE-in-the-Head
Ying Ouyang, Zuming Liu, Deng Tang, and Yanhong Xu
Enhancing Backdoor Persistence under Uncontrolled Federated Clients: A Bidirectional Adversarial and Redundant Embedding Framework
Lin Wei, Zitao Lyu, Lei Shi, Chengming Liu, and Huijuan Lian
Improved Tightly Secure (ID-based) Signatures in the AGM
Yanzibo Zhou, Fuchun Guo, Willy Susilo, and Nan Li
Information-Theoretic Privacy for Long-Term Share Storage on Noisy Media
Elmo Huang, Huaxiong Wang, and Kwok Yan Lam
Meet-LWE with Hints: Solving Ternary LWE with Information Leakage
Jinzheng Cao, Rongmao Chen, Haodong Jiang, and Qingfeng Cheng
Missing the Link? Enhancing the Security of Digital Car Keys With Secure Session Linking and Hardware Trust
Christian Plappert and Daniel Trick
Multi-Authority Attribute-Based Anonymous Credentials with Public Traceability and Revocation
Meng Sun, Mingmei Zheng, Junzuo Lai, Chi Wu, and Xiaohan Mo
Okara: Detection and Attribution of TLS Man-in-the-Middle Vulnerabilities in Android Apps with Foundation Models
Haoyun Yang, Ronghong Huang, Yong Fang, Beizeng Zhang, Junpu Guo, Zhanyu Wu, and Xianghang Mi
Prompt to Pwn: Automated Exploit Generation for Smart Contracts
Zeke Xiao, Qin Wang, Yuekang Li, and Shiping Chen
RC-MDNet: Risk-Controlled Malicious Domain Detection for Open-World Network Security
Yuning Jing
Retention-Consistent Concept Unlearning for Diffusion Models
Laiqiao Qin, Tianqing Zhu, Linlin Wang, and Wanlei Zhou
Robust Encrypted Video Identification in the Mixed-Segment Era: A Retrieval-Augmented Approach
Jia Yee Tan, Yiqiao Zhou, and Liu Xutong
Secure Sealed-bidding Networks via Conditional Time-aware Access Authorization
Qi Liu, Peng Jiang, Yimin Liu, Zhen Zhao, and Liehuang Zhu
ServiceChain: A Verifiable Cloud Service Framework for Resource-Constrained Blockchain Nodes
Lin Zhang, Shaowen Yao, Jiayuan Lv, Huajian Yu, and Hongxing Xu
Shielding MCP Tool: A Secure Execution Framework using TEE and Automated Trimming
Ruidong Han, Chengyan Ma, Ye Liu, Yuqing Niu, and David Lo
ST-Mamba: Spatio-temporal Feature-Based Encrypted Traffic Analysis Using Mamba Network
Jiangwen Zhu, Mingrui Fan, Ruohan Cao, Jinxin Zuo, and Yueming Lu
The Dark Side of Upgrades: Uncovering Insecurity in Smart Contract Upgrades
Dingding Wang, Jianting He, Siwei Wu, Yajin Zhou, Lei Wu, and Cong Wang
TIDE: Making Task-Agnostic Backdoors Harder to Erase in Pre-trained Language Models
Yan Meng, Zhigang Lu, Bing Li, Anan Du, and Shuchao Pang
Towards Public Tracing: Collaborative Traceable Secret Sharing
Pousali Dey, Rittwik Hajra, Subha Kar, and Soumit Pal
Transparent Fully Batchable Polynomial Commitment with Application to Scalable VSS
Xiangyu Kong, Min Zhang, and Yu Chen



