|
|
|||
|
||||
OverviewThis seven-volume set, LNCS 16541-16547, constitutes the proceedings of the 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2026, held in Rome, Italy, during May 10–14, 2026. The 142 papers included in these proceedings were carefully reviewed and selected from 675 submissions. They are organized in topical sections as follows: Part I: Signatures; Quantum Cryptography Part II: Applied Cryptography Part III: Multi-Party Computation Part IV: Post-Quantum Cryptography Part V: Foundations Part VI: Symmetric Cryptography and Related Techniques Part VII: Zero-Knowledge; Hardware and Embedded Systems Full Product DetailsAuthor: Joan Daemen , Emmanuel ThoméPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG ISBN: 9783032253354ISBN 10: 3032253357 Pages: 796 Publication Date: 05 June 2026 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Forthcoming Availability: Not yet available This item is yet to be released. You can pre-order this item and we will dispatch it to you upon its release. Table of Contents.- Zero-Knowledge; Hardware and Embedded Systems. .- Polylogarithmic Proofs for Multilinears over Binary Towers. .- Cyclo: Lightweight Lattice-based Folding via Partial Range Checks. .- Soloist: Distributed SNARK for R1CS with Constant Proof Size. .- Query-Optimal IOPPs for Linear-Time Encodable Codes. .- Jagged Polynomial Commitments (or: How to Stack Multilinears). .- Spectra: Interval-Agnostic Vector Range Argument for Unstructured Range Assertions. .- Dynark: Making Groth16 Dynamic. .- Sum-check protocol for approximate computations. .- Special Soundness and Binding Properties: A Framework for Tightly Secure zk-SNARKs. .- $k$-out-of-$n$ Proofs and Applications to Privacy-Preserving Cryptocurrencies. .- Robust Non-Interactive Zero-Knowledge Combiners. .- Dynamic zk-SNARKs (with Applications to Sparse zk-SNARKs and IVC). .- Critical Rounds in Multi-Round Proofs: Proof of Partial Knowledge and Trapdoor Commitments. .- How to Prove Post-Quantum Security for Succinct Non-Interactive Reductions. .- The Black-Box Simulation Barrier Persists in a Fully Quantum World. .- A Modular Approach to Succinct Arguments for QMA. .- On the Security of Linear Secret Sharing with General Noisy Side-Channel Leakage. .- PERSEUS ‚Äì Probabilistic Evaluation of Random probing SEcurity Using efficient Sampling. .- PaCMan ‚Äì Partition-Code Masking for Combined Security. .- Single-Trace Key Recovery Attacks on HQC Using Valid and Invalid Ciphertexts. .- Accelerating and verifying constant-time modular inversion.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||