• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • Progress in Cryptology - AFRICACRYPT 2025: 16th International Conference on Cryptology, Rabat, Morocco, July 21?23, 2025, Proceedings

    Progress in Cryptology - AFRICACRYPT 2025 by Nitaj, Abderrahmane; Petkova-Nikova, Svetla; Rijmen, Vincent;

    16th International Conference on Cryptology, Rabat, Morocco, July 21?23, 2025, Proceedings

    Series: Lecture Notes in Computer Science; 15651;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 79.17
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        33 583 Ft (31 984 Ft + 5% VAT)
      • Discount 20% (cc. 6 717 Ft off)
      • Discounted price 26 867 Ft (25 587 Ft + 5% VAT)

    33 583 Ft

    db

    Availability

    Not yet published.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher Springer
    • Date of Publication 30 July 2025
    • Number of Volumes 1 pieces, Book

    • ISBN 9783031972591
    • Binding Paperback
    • No. of pages487 pages
    • Size 235x155 mm
    • Language English
    • Illustrations 62 Illustrations, black & white
    • 700

    Categories

    Long description:

    This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025. 


    The 21 full papers presented in this volume were carefully reviewed and selected from 45 submissions. 


    They are grouped into the following topics: Homomorphic Encryption; Cryptanalysis of RSA; Cryptography Arithmetic; Side-channel Attacks; Designs; Cryptanalysis.

    More

    Table of Contents:

    .- Homomorphic Encryption.


    .- Convolution-Friendly Image Compression with FHE.


    .- Leveled Homomorphic Encryption over Composite Groups.


    .- Activate Me!: Designing Efficient Activation Functions for
    Privacy-Preserving Machine Learning with Fully Homomorphic Encryption.


    .- One-Way Homomorphic Encryption: A Composite Group Approach.


    .- Cryptanalysis of RSA.


    .- A Novel Partial Key Exposure Attack on Common Prime RSA.


    .- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve.


    .- A New Generalized Attack on RSA-like Cryptosystems.


    .- Cryptography Arithmetic.


    .- An Improvement of the Congruence Solver of Lattice Isomorphism
    Problem over Totally Real Number Fields and Applications.


    .- PMNS arithmetic for elliptic curve cryptography.


    .- Constant-time Integer Arithmetic for SQIsign.


    .- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment.


    .- Side-channel Attacks.


    .- Simple Power Analysis Attack on SQIsign.


    .- Correlation power analysis of LESS and CROSS.


    .- TPL: Power Leakage Model Based on Technology Library.


    .- Designs.


    .- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing.


    .- Behemoth: transparent polynomial commitment scheme with constant
    opening proof size and verifier time.


    .- Attribute-based Encryption using Sum-Product Decomposition of
    Boolean Functions.


    .- Simultaneously simple universal and indifferentiable hashing to elliptic
    curves.


    .- Cryptanalysis.


    .- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy
    Issues in SDSSE-CQ-S and VCDSSE.


    .- Efficient and Optimized Modeling of S-Boxes.


    .- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography.

    More