9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1-3, 2025, Proceedings Herausgegeben:Escudero, Daniel; Damgård, Ivan
9th International Conference on Cryptology and Information Security in Latin America, Medellín, Colombia, October 1-3, 2025, Proceedings Herausgegeben:Escudero, Daniel; Damgård, Ivan
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2025, held in Medellín, Colombia, in October 2025. The 17 full papers included in this book were carefully reviewed and selected from 41 submissions.They were focused on the following topical sections: Position Paper; Zero-Knowledge Proofs and Distributed Computation; Quantum and Post-Quantum Cryptography; Symmetric-Key Cryptography and Attacks; Machine Learning and Cryptanalysis; and Implementation and Efficiency.
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2025, held in Medellín, Colombia, in October 2025.
The 17 full papers included in this book were carefully reviewed and selected from 41 submissions.They were focused on the following topical sections: Position Paper; Zero-Knowledge Proofs and Distributed Computation; Quantum and Post-Quantum Cryptography; Symmetric-Key Cryptography and Attacks; Machine Learning and Cryptanalysis; and Implementation and Efficiency.
Artikelnr. des Verlages: 89547993, 978-3-032-06753-1
Seitenzahl: 489
Erscheinungstermin: 2. Oktober 2025
Englisch
Abmessung: 235mm x 155mm x 28mm
Gewicht: 756g
ISBN-13: 9783032067531
ISBN-10: 3032067537
Artikelnr.: 75250003
Herstellerkennzeichnung
Springer-Verlag GmbH
Tiergartenstr. 17
69121 Heidelberg
ProductSafety@springernature.com
Inhaltsangabe
.- Position Paper. .- Cryptography and Collective Power. .- Zero-Knowledge Proofs and Distributed Computation. .- Post-Quantum Zero-Knowledge with Space-Bounded Simulation. .- Adaptive UC NIZK for Practical Applications. .- Fast elliptic curve scalar multiplications in SN(T)ARK circuits. .- Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR. .- Quantum and Post-Quantum Cryptography. .- Orient Express: Using Frobenius to Express Oriented Isogenies. .- Improved algorithms for ascending isogeny volcanoes, and applications. .- The Tate Profile. .- Extending Regev s quantum algorithm to elliptic curves. .- The role of piracy in quantum proofs. .- Symmetric-Key Cryptography and Attacks. .- (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration. .- A Simple Forgery Attack on Pelican. .- From at Least $n/3$ to at Most $3sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function. .- Machine Learning and Cryptanalysis. .- Generic Partial Decryption as Feature Engineering for Neural Distinguishers. .- Extracting Some Hidden Layers of Deep Neural Networks in the Hard-Label Setting. .- Implementation and Efficiency. .- Rhizomes and the Roots of Efficiency Improving Prio. .- Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU.
.- Position Paper. .- Cryptography and Collective Power. .- Zero-Knowledge Proofs and Distributed Computation. .- Post-Quantum Zero-Knowledge with Space-Bounded Simulation. .- Adaptive UC NIZK for Practical Applications. .- Fast elliptic curve scalar multiplications in SN(T)ARK circuits. .- Great-LaKeys: An Improved Threshold-PRF and a Novel Exponent-VRF from LWR. .- Quantum and Post-Quantum Cryptography. .- Orient Express: Using Frobenius to Express Oriented Isogenies. .- Improved algorithms for ascending isogeny volcanoes, and applications. .- The Tate Profile. .- Extending Regev s quantum algorithm to elliptic curves. .- The role of piracy in quantum proofs. .- Symmetric-Key Cryptography and Attacks. .- (Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration. .- A Simple Forgery Attack on Pelican. .- From at Least $n/3$ to at Most $3sqrt{n}$: Correcting the Algebraic Immunity of the Hidden Weight Bit Function. .- Machine Learning and Cryptanalysis. .- Generic Partial Decryption as Feature Engineering for Neural Distinguishers. .- Extracting Some Hidden Layers of Deep Neural Networks in the Hard-Label Setting. .- Implementation and Efficiency. .- Rhizomes and the Roots of Efficiency Improving Prio. .- Runtime Code Generation for Constant-Time Secret-Indexed Array Accesses: Applications to PERK and NTRU.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826