|
|
|||
|
||||
OverviewThis seven-volume set, LNCS 16541-16547, constitutes the proceedings of the 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2026, held in Rome, Italy, during May 10–14, 2026. The 142 papers included in these proceedings were carefully reviewed and selected from 675 submissions. They are organized in topical sections as follows: Part I: Signatures; Quantum Cryptography Part II: Applied Cryptography Part III: Multi-Party Computation Part IV: Post-Quantum Cryptography Part V: Foundations Part VI: Symmetric Cryptography and Related Techniques Part VII: Zero-Knowledge; Hardware and Embedded Systems Full Product DetailsAuthor: Joan Daemen , Emmanuel ThoméPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032253323ISBN 10: 3032253322 Pages: 576 Publication Date: 07 May 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Active Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Symmetric Cryptography and Related Techniques. .- Attacks on Goldreich's Pseudorandom Generators by Grouping and Solving. .- When the Wrong Key Lives On: The Key-Recovery Procedure in Integral Attacks. .- Magic Pot: Cryptanalysis of full AIM2 in the standard and related-/reused-key settings using new elimination framework. .- Collision Attacks on SHA-256 up to 37 Steps with Improved Trail Search. .- Dual-Syncopation Meet-in-the-Middle Attacks: New Results on SHA-2 and MD5. .- Round-Based Approximation of (Higher-Order) Differential-Linear Correlation -- A Geometric Approach Perspective. .- Pairwise independence of AES-like block ciphers. .- New Techniques for Analyzing Differentials with Application to AES. .- Algorithmic Toolkit for Linearization of S-boxes. .- Random-Access AEAD for Fast Lightweight Online Encryption. .- Counter Galois Onion: Fast Non-Malleable Onion Encryption for Tor. .- Secure Onion Encryption and the Case of Counter Galois Onion. .- Upper Bound on Information-Theoretic Security of Permutation-Based Pseudorandom Functions. .- How to Build a Short-Input Random Oracle from Public Random Permutations. .- When Simple Permutations Mix Poorly: Limited Independence Does Not Imply Pseudorandomness. .- Neural-Inspired Advances in Integral Cryptanalysis. .- Navigating the Deep: End-to-End Extraction on Deep Neural Networks. .- Deep Neural Cryptography. .- HQC Beyond the Standard: Ciphertext Compression and Refined DFR Analysis.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||