Fr. 169.00

Advances in Cryptology - EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part VI

English · Paperback / Softback

Shipping usually within 6 to 7 weeks

Description

Read more

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography

List of contents

MPC II: Private Information Retrieval and Garbling: Plinko: Single-Server PIR with E cient Updates via Invertible PRFs.- On Algebraic Homomorphic Encryption and its Applications to Doubly-Efficient PIR.- Black Box Crypto is Useless for Doubly Efficient PIR.- Single-Server Client Preprocessing PIR with Tight Space-Time Trade-off.- Enhanced Trapdoor Hashing from DDH and DCR.- Efficient Mixed Garbling from Homomorphic Secret Sharing and GGM-Tree.- Breaking the 1/ -Rate Barrier for Arithmetic Garbling.- On the Adaptive Security of Free-XOR-based Garbling Schemes in the Plain Model.- TinyLabels: How to Compress Garbled Circuit Input Labels, Efficiently. Algorithms and Attacks: Improved Cryptanalysis of SNOVA.- Singular points of UOV and VOX.- The syzygy distinguisher.- Solving Multivariate Coppersmith Problems with Known Moduli.- On the Soundness of Algebraic Attacks against Code-based Assumptions.- Halving differential additions on Kummer lines.- Computing the endomorphism ring of a supersingular elliptic curve from a full rank suborder.

Summary

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography

Product details

Assisted by Serge Fehr (Editor), Fouque (Editor), Pierre-Alain Fouque (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 28.05.2025
 
EAN 9783031910944
ISBN 978-3-0-3191094-4
No. of pages 475
Dimensions 155 mm x 27 mm x 235 mm
Weight 745 g
Illustrations XX, 475 p. 39 illus., 16 illus. in color.
Series Lecture Notes in Computer Science
Subjects Natural sciences, medicine, IT, technology > IT, data processing > IT

Computersicherheit, Netzwerksicherheit, angewandte informatik, Netzwerk-Hardware, Kryptografie, Verschlüsselungstechnologie, Data Privacy, cryptography, Computer and Information Systems Applications, data security, Computer Communication Networks, Computer security, Cryptology, Mobile and Network Security, Security Services, Encryption

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.