Patra | Topics in Cryptology – CT-RSA 2025 | E-Book | sack.de
E-Book

E-Book, Englisch, 428 Seiten

Reihe: Lecture Notes in Computer Science

Patra Topics in Cryptology – CT-RSA 2025

Cryptographers’ Track at the RSA Conference 2025, San Francisco, CA, USA, April 28–May 1, 2025, Proceedings
Erscheinungsjahr 2025
ISBN: 978-3-031-88661-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

Cryptographers’ Track at the RSA Conference 2025, San Francisco, CA, USA, April 28–May 1, 2025, Proceedings

E-Book, Englisch, 428 Seiten

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-88661-4
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2025, CT-RSA 2025, held in San Francisco, CA, USA, during April 28–May 1, 2025.

The 17 full papers presented in this volume were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: Cryptanalysis; Public-Key Cryptography; Hardware and Software Implementations; Symmetric-Key Cryptography; Multiparty Computation and Zero-Knowledge; White-box Crypto.

Patra Topics in Cryptology – CT-RSA 2025 jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Cryptanalysis: The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs.- Quasidifferential Saves Infeasible Differential Improved Weak-Key Key Recovery Attacks on Round-Reduced GIFT.- Meet-in-the-Middle Attack on Primitives with Binary Matrix Linear Layer.- Comprehensive Robustness Analysis of GCM, CCM, and OCB3.- Quantum Chosen-Ciphertext Attacks Based on Simon’s Algorithm against Unified Structures.- Improved Key Recovery Attacks of Ascon. Public-Key Cryptography: DSKE: Digital Signatures with Key Extraction.- Simplified Adaptively Secure Threshold BLS Signatures.- Non-Interactive Threshold BBS+ From Pseudorandom Correlations.- Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Effcient Generic Construction. Hardware and Software Implementations: Masking Gaussian Elimination at Arbitrary Order with Application to Multivariate- and Code-Based PQC.- Post-Quantum Online/Offine Signatures. Symmetric-Key Cryptography: How (not) to hash into class groups of imaginary quadratic fields.- Sequential Indifferentiability of 7-round Misty Structures. Multiparty Computation and Zero-Knowledge: Secure Computation with Penalties, Revisited: How to Handle Coins with Various Colors.- Universal Adaptor Signatures from Blackbox Multi-Party Computation. White-box Crypto: Affne Equivalence-Based Key-Recovery Attacks on White-Box Implementations of the SM4 Block Cipher.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.