My Account Log in

1 option

Advances in Cryptology – EUROCRYPT 2025 : 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4–8, 2025, Proceedings, Part IV / edited by Serge Fehr, Pierre-Alain Fouque.

Springer Nature - Springer Computer Science (R0) eBooks 2025 English International Available online

View online
Format:
Book
Contributor:
Fehr, S. (Serge), Editor.
Fouque, Pierre-Alain., Editor.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 15604
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Computer networks--Security measures.
Computer networks.
Application software.
Data protection.
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Computer and Information Systems Applications.
Security Services.
Local Subjects:
Cryptology.
Mobile and Network Security.
Computer Communication Networks.
Computer and Information Systems Applications.
Security Services.
Physical Description:
1 online resource (XX, 458 p. 47 illus., 6 illus. in color.)
Edition:
1st ed. 2025.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2025.
Summary:
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography.
Contents:
(Non-)Interactive Proofs and Zero-Knowledge: New Techniques for Preimage Sampling: Improved NIZKs and More from LWE
Unique NIZKs and Steganography Detection
Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash
Succinct Arguments over Towers of Binary Fields
Blaze: Fast SNARKs from Interleaved RAA Codes
SNARKs for Virtual Machines are Non-Malleable
Malleable SNARKs and Their Applications
WHIR: ReedSolomon Proximity Testing with Super-Fast Verification
Instance Compression, Revisited
(Inefficient Prover) ZAPs from Hard-to-Invert Functions
Polocolo: A ZK-Friendly Hash Function Based on S-boxes Using Power Residues
Query-Reusable Proof Systems
Zero-Knowledge RAM: Doubly E cient and Black-Box
Low-Bandwidth Mixed Arithmetic in VOLE-Based ZK from Low-Degree PRGs.-Relaxed Vector Commitment for Shorter Signatures.
Notes:
Description based on publisher supplied metadata and other sources.
ISBN:
3-031-91134-2
OCLC:
1524425683

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account