
Advances in Cryptology ? EUROCRYPT 2025
44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4?8, 2025, Proceedings, Part V
Series: Lecture Notes in Computer Science; 15605;
- Publisher's listprice EUR 139.09
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 8% (cc. 4 720 Ft off)
- Discounted price 54 281 Ft (51 697 Ft + 5% VAT)
59 001 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher Springer
- Date of Publication 6 June 2025
- Number of Volumes 1 pieces, Book
- ISBN 9783031910913
- Binding Paperback
- No. of pages480 pages
- Size 235x155 mm
- Language English
- Illustrations 53 Illustrations, black & white 700
Categories
Long description:
This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025.
The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows:
Part I: Secure Multiparty Computation I
Part II: Public-Key Cryptography and Key-Exchange
Part III: Advanced Cryptographic Schemes
Part IV: (Non-)Interactive Proofs and Zero-Knowledge
Part V: Secure Multiparty Computation II
Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks
Part VII: Theoretical Foundations
Part VIII: Real-World Cryptography
Table of Contents:
Secure Multiparty Computation II: Multi-key Homomorphic Secret Sharing.- Disincentivize Collusion in Veri able Secret Sharing.- Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement.- MiniCast: Minimizing the Communication Complexity of Reliable Broadcast.- Asymptotically Optimal Early Termination for Dishonest Majority Broadcast.- Efficient Pseudorandom Correlation Generators for Any Finite Field.- Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once.- Simultaneous-Message and Succinct Secure Computation.- Efficient Multiparty Private Simultaneous Messages for Symmetric Functions.- MPC with Publicly Identi able Abort from Pseudorandomness and Homomorphic Encryption.- The Complexity of Memory Checking with Covert Security.- Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions.- Black-Box Constant-Round Secure 2PC with Succinct Communication.- Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries.- Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC.- Honest Majority MPC with Õ(|C|) Communication in Minicrypt.
More