Advances in Cryptology – EUROCRYPT 2026: 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Rome, Italy, May 10–14, 2026, Proceedings, Part VI

Author:   Joan Daemen ,  Emmanuel Thomé
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032253323


Pages:   576
Publication Date:   07 May 2026
Format:   Paperback
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Advances in Cryptology – EUROCRYPT 2026: 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Rome, Italy, May 10–14, 2026, Proceedings, Part VI


Overview

This seven-volume set, LNCS 16541-16547, constitutes the proceedings of the 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2026, held in Rome, Italy, during May 10–14, 2026. The 142 papers included in these proceedings were carefully reviewed and selected from 675 submissions. They are organized in topical sections as follows: Part I: Signatures; Quantum Cryptography Part II: Applied Cryptography Part III: Multi-Party Computation Part IV: Post-Quantum Cryptography Part V: Foundations Part VI: Symmetric Cryptography and Related Techniques Part VII: Zero-Knowledge; Hardware and Embedded Systems

Full Product Details

Author:   Joan Daemen ,  Emmanuel Thomé
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032253323


ISBN 10:   3032253322
Pages:   576
Publication Date:   07 May 2026
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Not yet available   Availability explained
This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release.

Table of Contents

.- Symmetric Cryptography and Related Techniques. .- Attacks on Goldreich's Pseudorandom Generators by Grouping and Solving. .- When the Wrong Key Lives On: The Key-Recovery Procedure in Integral Attacks. .- Magic Pot: Cryptanalysis of full AIM2 in the standard and related-/reused-key settings using new elimination framework. .- Collision Attacks on SHA-256 up to 37 Steps with Improved Trail Search. .- Dual-Syncopation Meet-in-the-Middle Attacks: New Results on SHA-2 and MD5. .- Round-Based Approximation of (Higher-Order) Differential-Linear Correlation -- A Geometric Approach Perspective. .- Pairwise independence of AES-like block ciphers. .- New Techniques for Analyzing Differentials with Application to AES. .- Algorithmic Toolkit for Linearization of S-boxes. .- Random-Access AEAD for Fast Lightweight Online Encryption. .- Counter Galois Onion: Fast Non-Malleable Onion Encryption for Tor. .- Secure Onion Encryption and the Case of Counter Galois Onion. .- Upper Bound on Information-Theoretic Security of Permutation-Based Pseudorandom Functions. .- How to Build a Short-Input Random Oracle from Public Random Permutations. .- When Simple Permutations Mix Poorly: Limited Independence Does Not Imply Pseudorandomness. .- Neural-Inspired Advances in Integral Cryptanalysis. .- Navigating the Deep: End-to-End Extraction on Deep Neural Networks. .- Deep Neural Cryptography. .- HQC Beyond the Standard: Ciphertext Compression and Refined DFR Analysis.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

MRGC26

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List