Verkauf durch Sack Fachmedien

Patra

Topics in Cryptology - CT-RSA 2025

Cryptographers' Track at the RSA Conference 2025, San Francisco, CA, USA, April 28-May 1, 2025, Proceedings

Medium: Buch
ISBN: 978-3-031-88660-7
Verlag: Springer Nature Switzerland
Erscheinungstermin: 05.04.2025
Lieferfrist: bis zu 10 Tage

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28–May 1, 2025.

The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.


Produkteigenschaften


  • Artikelnummer: 9783031886607
  • Medium: Buch
  • ISBN: 978-3-031-88660-7
  • Verlag: Springer Nature Switzerland
  • Erscheinungstermin: 05.04.2025
  • Sprache(n): Englisch
  • Auflage: Erscheinungsjahr 2025
  • Serie: Lecture Notes in Computer Science
  • Produktform: Kartoniert
  • Gewicht: 663 g
  • Seiten: 428
  • Format (B x H x T): 155 x 235 x 24 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Herausgeber

Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT.- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.- Comprehensive Robustness Analysis of GCM, CCM, and OCB3.- Quantum Chosen-Ciphertext Attacks Based on Simon’s Algorithm against Unified Structures.- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction.- Simplified Adaptively Secure Threshold BLS Signatures.- Non-Interactive Threshold BBS+ From Pseudorandom Correlations.- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC.- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields.- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors.- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.