My Account Log in

1 option

Advances in Cryptology – EUROCRYPT 2025 : 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part V / edited by Serge Fehr, Pierre-Alain Fouque.

Springer Nature - Springer Computer Science (R0) eBooks 2025 English International Available online

View online
Format:
Book
Contributor:
Fehr, S. (Serge), Editor.
Fouque, Pierre-Alain., Editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 15605
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Computer networks.
Application software.
Data protection.
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Computer and Information Systems Applications.
Security Services.
Local Subjects:
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Computer and Information Systems Applications.
Security Services.
Physical Description:
1 online resource (XX, 486 p. 63 illus., 18 illus. in color.)
Edition:
1st ed. 2025.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2025.
Summary:
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography.
Contents:
Secure Multiparty Computation II: Multi-key Homomorphic Secret Sharing
Disincentivize Collusion in Veri able Secret Sharing
Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement
MiniCast: Minimizing the Communication Complexity of Reliable Broadcast
Asymptotically Optimal Early Termination for Dishonest Majority Broadcast
Efficient Pseudorandom Correlation Generators for Any Finite Field
Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once
Simultaneous-Message and Succinct Secure Computation
Efficient Multiparty Private Simultaneous Messages for Symmetric Functions
MPC with Publicly Identi able Abort from Pseudorandomness and Homomorphic Encryption
The Complexity of Memory Checking with Covert Security
Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions
Black-Box Constant-Round Secure 2PC with Succinct Communication
Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries
Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC
Honest Majority MPC with Õ(/C/) Communication in Minicrypt.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
3-031-91092-3
OCLC:
1524421745

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account