Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part IV

Author:   Tibor Jager ,  Jiaxin Pan
Publisher:   Springer International Publishing AG
Volume:   15677
ISBN:  

9783031918285


Pages:   415
Publication Date:   08 May 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Public-Key Cryptography – PKC 2025: 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12–15, 2025, Proceedings, Part IV


Overview

Full Product Details

Author:   Tibor Jager ,  Jiaxin Pan
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15677
ISBN:  

9783031918285


ISBN 10:   3031918282
Pages:   415
Publication Date:   08 May 2025
Audience:   Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.
Language:   English

Table of Contents

Secure Computation: Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal.- Securely Instantiating ‘Half Gates’ Garbling in the Standard Model.- Effcient Permutation Correlations and Batched Random Access for Two-Party Computation.- Π: A Unified Framework for Computational Verifiable Secret Sharing. Security against Real-World Attacks: Intermundium-DL: Assessing the Resilience of Current Schemes to Discrete-Log-Computation Attacks on Public Parameters.- Public-Algorithm Substitution Attacks: Subverting Hashing and Verification.- Kleptographic Attacks against Implicit Rejection.- Deny Whatever You Want: Dual-Deniable Public-Key Encryption. Batch Arguments and Decentralized Encryption: Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity.- Chosen Ciphertext Security via BARGs.- Dynamic Decentralized Functional Encryption: Generic Constructions with Strong Security.- Dynamic Decentralized Functional Encryptions from Pairings in the Standard Model.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

April RG 26_2

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List