Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part I

Author:   Tibor Jager ,  Jiaxin Pan
Publisher:   Springer International Publishing AG
Volume:   15674
ISBN:  

9783031918193


Pages:   488
Publication Date:   08 May 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part I


Overview

Full Product Details

Author:   Tibor Jager ,  Jiaxin Pan
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15674
ISBN:  

9783031918193


ISBN 10:   3031918193
Pages:   488
Publication Date:   08 May 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

MPC and Friends: Non-Interactive Distributed Point Functions.- Watermarkable and Zero-Knowledge Verifiable Delay Functions from any Proof of Exponentiation.- Higher Residuosity Attacks on Small RSA Subgroup Decision Problems. Advanced PKE: Adaptively Secure IBE from Lattices with Asymptotically Better Effciency.- Adaptively-Secure Big-Key Identity-Based Encryption.- Non-Committing Identity based Encryption: Constructions and Applications.- Registration-Based Encryption in the Plain Model. Security of Post-Quantum Signatures: Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure.- Finding a polytope: A practical fault attack against Dilithium.- One Bit to Rule Them All - Imperfect Randomness Harms Lattice Signatures.- The Security of Hash-and-Sign with Retry against Superposition Attacks. Proofs and Arguments: Split Prover Zero-Knowledge SNARKs.- Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler.- Transparent SNARKs over Galois Rings.- Lattice-based Proof-Friendly Signatures from Vanishing Short Integer Solutions.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

April RG 26_2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List