Topics in Cryptology – CT-RSA 2025: Cryptographers’ Track at the RSA Conference 2025, San Francisco, CA, USA, April 28–May 1, 2025, Proceedings

Author:   Arpita Patra
Publisher:   Springer International Publishing AG
Volume:   15598
ISBN:  

9783031886607


Pages:   428
Publication Date:   05 April 2025
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $336.35 Quantity:  
Add to Cart

Share |

Topics in Cryptology – CT-RSA 2025: Cryptographers’ Track at the RSA Conference 2025, San Francisco, CA, USA, April 28–May 1, 2025, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28–May 1, 2025. The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.  

Full Product Details

Author:   Arpita Patra
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Volume:   15598
ISBN:  

9783031886607


ISBN 10:   3031886607
Pages:   428
Publication Date:   05 April 2025
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT.- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.- Comprehensive Robustness Analysis of GCM, CCM, and OCB3.- Quantum Chosen-Ciphertext Attacks Based on Simon’s Algorithm against Unified Structures.- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction.- Simplified Adaptively Secure Threshold BLS Signatures.- Non-Interactive Threshold BBS+ From Pseudorandom Correlations.- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC.- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields.- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors.- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

RGJUNE2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List