Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Topics in Cryptology – CT-RSA 2025 -

Topics in Cryptology – CT-RSA 2025

Cryptographers’ Track at the RSA Conference 2025, San Francisco, CA, USA, April 28–May 1, 2025, Proceedings

Arpita Patra (Herausgeber)

Buch | Softcover
X, 428 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-88660-7 (ISBN)
CHF 224,65 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28 May 1, 2025.

The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.

 

Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT.- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.- Comprehensive Robustness Analysis of GCM, CCM, and OCB3.- Quantum Chosen-Ciphertext Attacks Based on Simon s Algorithm against Unified Structures.- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction.- Simplified Adaptively Secure Threshold BLS Signatures.- Non-Interactive Threshold BBS+ From Pseudorandom Correlations.- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC.- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields.- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors.- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo X, 428 p. 88 illus., 40 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Cryptanalysis • cryptography • multiparty computation • post-quantum security • Public-Key • Signatures • Symmetric-key
ISBN-10 3-031-88660-7 / 3031886607
ISBN-13 978-3-031-88660-7 / 9783031886607
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich