Read more
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography
List of contents
(Non-)Interactive Proofs and Zero-Knowledge: New Techniques for Preimage Sampling: Improved NIZKs and More from LWE.- Unique NIZKs and Steganography Detection.- Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash.- Succinct Arguments over Towers of Binary Fields.- Blaze: Fast SNARKs from Interleaved RAA Codes.- SNARKs for Virtual Machines are Non-Malleable.- Malleable SNARKs and Their Applications.- WHIR: ReedSolomon Proximity Testing with Super-Fast Verification.- Instance Compression, Revisited.- (Inefficient Prover) ZAPs from Hard-to-Invert Functions.- Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues.- Query-Reusable Proof Systems.- Zero-Knowledge RAM: Doubly E cient and Black-Box.- Low-Bandwidth Mixed Arithmetic in VOLE-Based ZK from Low-Degree PRGs.-Relaxed Vector Commitment for Shorter Signatures.
Summary
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography