Verkauf durch Sack Fachmedien

Pan / Jager

Public-Key Cryptography - PKC 2025

28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025, Proceedings, Part V

Medium: Buch
ISBN: 978-3-031-91831-5
Verlag: Springer International Publishing
Erscheinungstermin: 08.05.2025
Lieferfrist: bis zu 10 Tage

The five-volume set LNCS 15674-15678 constitutes the refereed proceedings of the 28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025, held in Røros, Norway, during May 12–15, 2025.

The 60 papers included in these proceedings were carefully reviewed and selected from 199 submissions. They are grouped into these topical sections: MPC and friends; advanced PKE; security of post-quantum signatures; proofs and arguments; multi-signatures; protocols; foundations of lattices and LPN; threshold signatures; isogenies and group actions; secure computation; security against real-world attacks; batch arguments and decentralized encryption; and cryptography for blockchains.


Produkteigenschaften


  • Artikelnummer: 9783031918315
  • Medium: Buch
  • ISBN: 978-3-031-91831-5
  • Verlag: Springer International Publishing
  • Erscheinungstermin: 08.05.2025
  • Sprache(n): Englisch
  • Auflage: Erscheinungsjahr 2025
  • Serie: Lecture Notes in Computer Science
  • Produktform: Kartoniert
  • Gewicht: 482 g
  • Seiten: 299
  • Format (B x H x T): 155 x 235 x 18 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Advanced PKE: Multi-Client Attribute-Based Unbounded Inner Product Functional Encryption, and More.- Multi-Client Attribute-Based and Predicate Encryption, Revisited.- Bootstrapping with RMFE for Fully Homomorphic Encryption.- Revisiting the Security of Approximate FHE with Noise-Flooding Countermeasures. Cryptography for Blockchains: Lattice-based Zero-knowledge Proofs for Blockchain Confidential Transactions.- OCash: Fully Anonymous Payments between Blockchain Light Clients.- On Graphs of Incremental Proofs of Sequential Work.- Stateless Threshold Schnorr Signatures with Game-Based Security.- Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication.