Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II

Author:   Benny Applebaum ,  Huijia (Rachel) Lin
Publisher:   Springer Nature Switzerland AG
ISBN:  

9783032122926


Pages:   531
Publication Date:   02 December 2025
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.17 Quantity:  
Add to Cart

Share |

Theory of Cryptography: 23rd International Conference, TCC 2025, Aarhus, Denmark, December 1–5, 2025, Proceedings, Part II


Overview

Full Product Details

Author:   Benny Applebaum ,  Huijia (Rachel) Lin
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
ISBN:  

9783032122926


ISBN 10:   3032122929
Pages:   531
Publication Date:   02 December 2025
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

.- Foundations. .- Offline-Online Indifferentiability of Cryptographic Systems. .- Seedless Condensers for Efficiently Samplable Sources. .- Incompressible Encryption with Everlasting Security. .- Relationships among FuncCPA and Its Related Notions. .- Lower Bounds on Inner-Product Functional Encryption from All-or-Nothing Encryption Primitives. .- A Meta-Complexity Theoretic Approach to Indistinguishability Obfuscation and Witness Pseudo-Canonicalization. .- Obfuscation and Functional Encryption. .- Obfuscating Pseudorandom Functions is Post-Quantum Complete. .- Pseudorandom FE and iO with Applications. .- Zeroizing Attacks against Evasive and Circular Evasive LWE. .- (Multi-Input) FE for Randomized Functionalities, Revisited. .- Adaptively Secure Streaming Functional Encryption. .- Secret Sharing. .- Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes. .- Deniable Secret Sharing. .- Polynomial Secret Sharing Schemes and Algebraic Matroids. .- Pseudorandom Correlation Functions for Garbled Circuits. .-  Multiparty Homomorphic Secret Sharing and More from LPN and MQ.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List