Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.

The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography

1147185639
Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.

The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography

129.0 In Stock
Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III

Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III

Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III

Advances in Cryptology - EUROCRYPT 2025: 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III

eBook

$129.00 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.

The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography


Product Details

ISBN-13: 9783031911316
Publisher: Springer-Verlag New York, LLC
Publication date: 05/29/2025
Series: Lecture Notes in Computer Science , #15603
Sold by: Barnes & Noble
Format: eBook
File size: 35 MB
Note: This product may take a few minutes to download.

Table of Contents

Advanced Cryptographic Schemes: Multi-Authority Registered Attribute-Based Encryption.- Almost Optimal KP and CP-ABE for Circuits from Succinct LWE.- Universal Computational Extractors and Multi-Bit AIPO from Lattice Assumptions.- Faster ABE for Turing Machines from Circular Evasive LWE.- Snake-eye Resistant PKE from LWE for Oblivious Message Retrieval and Robust Encryption.- Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications.- On Quantum Money and Evasive Obfuscation.- A Simple Framework for Secure Key Leasing.- Quantum Key Leasing for PKE and FHE with a Classical Lessor.- Secret Sharing with Publicly Verifiable Deletion.- Optimal Traitor Tracing from Pairings.- A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model.- Fully Homomorphic Encryption for Cyclotomic Prime Moduli.- SHIP: A Shallow and Highly Parallelizable CKKS Bootstrapping Algorithm.- Anamorphism Beyond One-To-One Messaging: Public-Key with Anamorphic Broadcast Mode.

From the B&N Reads Blog

Customer Reviews