|
|
|||
|
||||
OverviewThis seven-volume set, LNCS 16541-16547, constitutes the proceedings of the 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2026, held in Rome, Italy, during May 10–14, 2026. The 142 papers included in these proceedings were carefully reviewed and selected from 675 submissions. They are organized in topical sections as follows: Part I: Signatures; Quantum Cryptography Part II: Applied Cryptography Part III: Multi-Party Computation Part IV: Post-Quantum Cryptography Part V: Foundations Part VI: Symmetric Cryptography and Related Techniques Part VII: Zero-Knowledge; Hardware and Embedded Systems Full Product DetailsAuthor: Joan Daemen , Emmanuel ThoméPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032252906ISBN 10: 3032252903 Pages: 664 Publication Date: 08 May 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Signatures; Quantum Cryptography. .- Adaptively-Secure Three Round Threshold Schnorr from DL. .- Adaptively Secure Partially Non-Interactive Threshold Schnorr Signatures in the AGM. .- UC4Free! Existing Threshold Signatures are UC Secure. .- TalonG: Bandwidth-Efficient Two-Round Threshold Signatures from Lattices. .- Tweed: Adaptively Secure Lattice-Based Two-Round Threshold Signatures. .- Earpicks: Tightly Secure Two-Round Multi- and Threshold Signatures. .- Putting Multi into Multi-Signatures: Tight Security for Multiple Signers. .- DahLIAS: Discrete Logarithm-Based Interactive Aggregate Signatures. .- Tight Security for BBS Signatures. .- WOMBAT: Post-Quantum Blind Signature from Standard Group Action Assumptions and More. .- Short Signatures from DDH without Pairings or Random Oracles. .- Two-party ECDSA Signing at Constant Communication Overhead. .- Reducing the Number of Qubits in Quantum Discrete Logarithms on Elliptic Curves. .- Parallel Spooky Pebbling Makes Regev Factoring More Practical. .- Tight Quantum Time-Space Tradeoffs for Permutation Inversion. .- Super-Quadratic Quantum Speed-ups and Guessing Many Likely Keys. .- How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions: A Unified Solution to Quantum Protection. .- Proofs of No Intrusion. .- Copy-Protection from UPO, Revisited. .- Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption. .- On the Cryptographic Futility of Non-collapsing Measurements. .- Another Look at the Quantum Security of the Vectorization Problem with Shifted Inputs.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||