Advances in Cryptology – EUROCRYPT 2026: 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Rome, Italy, May 10–14, 2026, Proceedings, Part II

Author:   Joan Daemen ,  Emmanuel Thomé
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032253163


Pages:   519
Publication Date:   03 June 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $168.16 Quantity:  
Pre-Order

Share |

Advances in Cryptology – EUROCRYPT 2026: 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Rome, Italy, May 10–14, 2026, Proceedings, Part II


Overview

Full Product Details

Author:   Joan Daemen ,  Emmanuel Thomé
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032253163


ISBN 10:   3032253160
Pages:   519
Publication Date:   03 June 2026
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Forthcoming
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Applied Cryptography. .- ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420. .- Group Key Progression: Strong Security for Shared Persistent Data. .- Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions. .- Combining Oblivious Pseudorandom Functions. .- Two-Factor Authentication Can Harden Servers Against Offline Password Search. .- Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols. .- At-Compromise Security: The Case for Alert Blindness. .- Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability. .- Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH. .- OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security. .- Computationally Succinct Authentication from DCR: Attribute-Based Laconic Function Evaluation and More. .- Device-Bound Anonymous Credentials With(out) Trusted Hardware. .- Updatable Private Set Intersection from Symmetric-Key Techniques. .- Malicious Private Set Union with Two-Sided Output. .- Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters. .- Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange. .- Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

MRGC26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List