Ulteriori informazioni
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography
Sommario
Real-World Cryptography: A Generic Framework for Side-Channel Attacks against LWE-based Cryptosystems.- INDIANA - Verifying (Random) Probing Security through Indistinguishability Analysis.- Physical-bit Leakage Resilience of Linear Code-based Secret Sharing.- New Techniques for Random Probing Security and Application to Raccoon Signature Scheme.- Tighter Security Notions for a Modular Approach to Private Circuits.- Ciphertext-Ciphertext Matrix Multiplication: Fast for Large Matrices.- Drifting Towards Better Error Probabilities in Fully Homomorphic Encryption Schemes.- Analysis of the Telegram Key Exchange.- Formal Analysis of Multi-Device Group Messaging in WhatsApp.- Analyzing Group Chat Encryption in MLS, Session, Signal, and Matrix.- Triple Ratchet: A Bandwidth Efficient Hybrid-Secure Signal Protocol.- The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations.- Hollow LWE: A New Spin, Unbounded Updatable Encryption from LWE and PCE.- Key Derivation Functions Without a Grain of Salt.
Riassunto
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography