Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Advances in Cryptology – EUROCRYPT 2025 -

Advances in Cryptology – EUROCRYPT 2025

44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part VI
Buch | Softcover
XX, 475 Seiten
2025
Springer International Publishing (Verlag)
978-3-031-91094-4 (ISBN)
CHF 194,70 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.

The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography

MPC II: Private Information Retrieval and Garbling: Plinko: Single-Server PIR with E cient Updates via Invertible PRFs.- On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR.- Black Box Crypto is Useless for Doubly Efficient PIR.- Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off.- Enhanced Trapdoor Hashing from DDH and DCR.- Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree.- Breaking the 1/ -Rate Barrier for Arithmetic Garbling.- On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model.- TinyLabels: How to Compress Garbled Circuit Input Labels, Efficiently. Algorithms and Attacks: Improved Cryptanalysis of SNOVA.- Singular points of UOV and VOX.- The syzygy distinguisher.- Solving Multivariate Coppersmith Problems with Known Moduli.- On the Soundness of Algebraic Attacks against Code-based Assumptions.- Halving differential additions on Kummer lines.- Computing the endomorphism ring of a supersingular elliptic curve from a full rank suborder.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XX, 475 p. 39 illus., 16 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Computer Security • cryptography • data privacy • Data Security • Encryption
ISBN-10 3-031-91094-X / 303191094X
ISBN-13 978-3-031-91094-4 / 9783031910944
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich