
Advances in Cryptology - EUROCRYPT 2025
44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part III
Herausgegeben: Fehr, Serge; Fouque, Pierre-Alain
PAYBACK Punkte
49 °P sammeln!
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:Part I: Secure Multiparty Computation IPart II: Public-Key Cryptography and Key-ExchangePart III: Advanced Cryptographic SchemesPart IV: (Non-)Interactive Proofs and Zero-KnowledgePart V: Secure Multiparty Computa...
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4 8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography