Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part II

Author:   Tibor Jager ,  Jiaxin Pan
Publisher:   Springer International Publishing AG
Volume:   15675
ISBN:  

9783031918223


Pages:   393
Publication Date:   08 May 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $310.47 Quantity:  
Add to Cart

Share |

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part II


Overview

Full Product Details

Author:   Tibor Jager ,  Jiaxin Pan
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15675
ISBN:  

9783031918223


ISBN 10:   3031918223
Pages:   393
Publication Date:   08 May 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.
Language:   English

Table of Contents

Multi-Signatures: Universally Composable Interactive and Ordered Multi-Signatures.- Accountable Multi-Signatures with Constant Size Public Keys.- Privacy-Preserving Multi-Signatures: Generic Techniques and Constructions Without Pairings.- A Framework for Group Action-Based Multi-Signatures and Applications to LESS, MEDS, and ALTEQ. Protocols: Security Analysis of Signal’s PQXDH Handshake.- Towards Leakage-Resilient Ratcheted Key Exchange.- Non-Interactive Key Exchange: New Notions, New Constructions, and Forward Security.- Effcient Verifiable Mixnets from Lattices, Revisited. Foundations of Lattices and LPN: Vanishing Short Integer Solution, Revisited: Reductions, Trapdoors, Homomorphic Signatures for Low-Degree Polynomials.- Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians.- Memory-Effcient BKW Algorithm for Solving the LWE Problem.- Worst and Average Case Hardness of Decoding via Smoothing Bounds.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

April RG 26_2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List