Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Cryptology – EUROCRYPT 2025 -

Advances in Cryptology – EUROCRYPT 2025

44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part II
Buch | Softcover
XX, 484 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-91123-1 (ISBN)
CHF 194,70 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.

The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography

Public-Key Cryptography and Key-Exchange: Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN.- Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption.- Post-Quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN.- POKÉ: A Compact and Efficient PKE from Higher-dimensional Isogenies.- Re-Randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions.- A reduction from Hawk to the principal ideal problem in a quaternion algebra.- Cryptanalysis of rank-2 module-LIP: a single real embedding is all it takes.- Do Not Disturb a Sleeping Falcon: Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences.- (Un)breakable curses - re-encryption in the Fujisaki-Okamoto transform.- Generic Anamorphic Encryption, Revisited: New Limitations and Constructions.- Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security.- Stronger Security for Threshold Blind Signatures.- Non-Interactive Blind Signatures from RSA Assumption and More.- PAKE Combiners and E cient Post-Quantum Instantiations.- Hybrid Password Authentication Key Exchange in the UC Framework.- Under What Conditions Is Encrypted Key Exchange Actually Secure?

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XX, 484 p. 76 illus., 16 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Cryptanalysis • cryptographic protocols • cryptography • efficient and secure implementations • formal security models • information-theoretic techniques • mathematical foundations of cryptography • (post-)quantum cryptography • Public-Key Cryptography • symmetric cryptography and hash functions
ISBN-10 3-031-91123-7 / 3031911237
ISBN-13 978-3-031-91123-1 / 9783031911231
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich