Progress in Cryptology - AFRICACRYPT 2025 (eBook, PDF)
16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21-23, 2025, Proceedings
Redaktion: Nitaj, Abderrahmane; Rijmen, Vincent; Petkova-Nikova, Svetla
59,95 €
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
59,95 €
Als Download kaufen
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Progress in Cryptology - AFRICACRYPT 2025 (eBook, PDF)
16th International Conference on Cryptology in Africa, Rabat, Morocco, July 21-23, 2025, Proceedings
Redaktion: Nitaj, Abderrahmane; Rijmen, Vincent; Petkova-Nikova, Svetla
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025.
The 21 full papers presented in this volume were carefully reviewed and selected from 45 submissions.
They are grouped into the following topics: Homomorphic Encryption; Cryptanalysis of RSA; Cryptography Arithmetic; Side-channel Attacks; Designs; Cryptanalysis.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 22.72MB
Andere Kunden interessierten sich auch für
Progress in Cryptology - AFRICACRYPT 2024 (eBook, PDF)112,95 €
Progress in Cryptology - AFRICACRYPT 2023 (eBook, PDF)72,95 €
Progress in Cryptology - AFRICACRYPT 2022 (eBook, PDF)40,95 €
Progress in Cryptology -- LATINCRYPT 2015 (eBook, PDF)40,95 €
Advances in Cryptology - CRYPTO 2025 (eBook, PDF)59,95 €
Advances in Cryptology - CRYPTO 2025 (eBook, PDF)59,95 €
Advances in Cryptology - CRYPTO 2025 (eBook, PDF)59,95 €-
-
-
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in Africa, AFRICACRYPT 2025, which took place in Rabat, Morocco in July 2025.
The 21 full papers presented in this volume were carefully reviewed and selected from 45 submissions.
They are grouped into the following topics: Homomorphic Encryption; Cryptanalysis of RSA; Cryptography Arithmetic; Side-channel Attacks; Designs; Cryptanalysis.
The 21 full papers presented in this volume were carefully reviewed and selected from 45 submissions.
They are grouped into the following topics: Homomorphic Encryption; Cryptanalysis of RSA; Cryptography Arithmetic; Side-channel Attacks; Designs; Cryptanalysis.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 494
- Erscheinungstermin: 14. Juli 2025
- Englisch
- ISBN-13: 9783031972607
- Artikelnr.: 74906655
- Verlag: Springer International Publishing
- Seitenzahl: 494
- Erscheinungstermin: 14. Juli 2025
- Englisch
- ISBN-13: 9783031972607
- Artikelnr.: 74906655
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- Homomorphic Encryption.
.- Convolution-Friendly Image Compression with FHE.
.- Leveled Homomorphic Encryption over Composite Groups.
.- Activate Me!: Designing Efficient Activation Functions for
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption.
.- One-Way Homomorphic Encryption: A Composite Group Approach.
.- Cryptanalysis of RSA.
.- A Novel Partial Key Exposure Attack on Common Prime RSA.
.- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve.
.- A New Generalized Attack on RSA-like Cryptosystems.
.- Cryptography Arithmetic.
.- An Improvement of the Congruence Solver of Lattice Isomorphism
Problem over Totally Real Number Fields and Applications.
.- PMNS arithmetic for elliptic curve cryptography.
.- Constant-time Integer Arithmetic for SQIsign.
.- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment.
.- Side-channel Attacks.
.- Simple Power Analysis Attack on SQIsign.
.- Correlation power analysis of LESS and CROSS.
.- TPL: Power Leakage Model Based on Technology Library.
.- Designs.
.- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing.
.- Behemoth: transparent polynomial commitment scheme with constant
opening proof size and verifier time.
.- Attribute-based Encryption using Sum-Product Decomposition of
Boolean Functions.
.- Simultaneously simple universal and indifferentiable hashing to elliptic
curves.
.- Cryptanalysis.
.- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy
Issues in SDSSE-CQ-S and VCDSSE.
.- Efficient and Optimized Modeling of S-Boxes.
.- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography.
.- Convolution-Friendly Image Compression with FHE.
.- Leveled Homomorphic Encryption over Composite Groups.
.- Activate Me!: Designing Efficient Activation Functions for
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption.
.- One-Way Homomorphic Encryption: A Composite Group Approach.
.- Cryptanalysis of RSA.
.- A Novel Partial Key Exposure Attack on Common Prime RSA.
.- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve.
.- A New Generalized Attack on RSA-like Cryptosystems.
.- Cryptography Arithmetic.
.- An Improvement of the Congruence Solver of Lattice Isomorphism
Problem over Totally Real Number Fields and Applications.
.- PMNS arithmetic for elliptic curve cryptography.
.- Constant-time Integer Arithmetic for SQIsign.
.- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment.
.- Side-channel Attacks.
.- Simple Power Analysis Attack on SQIsign.
.- Correlation power analysis of LESS and CROSS.
.- TPL: Power Leakage Model Based on Technology Library.
.- Designs.
.- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing.
.- Behemoth: transparent polynomial commitment scheme with constant
opening proof size and verifier time.
.- Attribute-based Encryption using Sum-Product Decomposition of
Boolean Functions.
.- Simultaneously simple universal and indifferentiable hashing to elliptic
curves.
.- Cryptanalysis.
.- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy
Issues in SDSSE-CQ-S and VCDSSE.
.- Efficient and Optimized Modeling of S-Boxes.
.- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography.
.- Homomorphic Encryption.
.- Convolution-Friendly Image Compression with FHE.
.- Leveled Homomorphic Encryption over Composite Groups.
.- Activate Me!: Designing Efficient Activation Functions for
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption.
.- One-Way Homomorphic Encryption: A Composite Group Approach.
.- Cryptanalysis of RSA.
.- A Novel Partial Key Exposure Attack on Common Prime RSA.
.- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve.
.- A New Generalized Attack on RSA-like Cryptosystems.
.- Cryptography Arithmetic.
.- An Improvement of the Congruence Solver of Lattice Isomorphism
Problem over Totally Real Number Fields and Applications.
.- PMNS arithmetic for elliptic curve cryptography.
.- Constant-time Integer Arithmetic for SQIsign.
.- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment.
.- Side-channel Attacks.
.- Simple Power Analysis Attack on SQIsign.
.- Correlation power analysis of LESS and CROSS.
.- TPL: Power Leakage Model Based on Technology Library.
.- Designs.
.- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing.
.- Behemoth: transparent polynomial commitment scheme with constant
opening proof size and verifier time.
.- Attribute-based Encryption using Sum-Product Decomposition of
Boolean Functions.
.- Simultaneously simple universal and indifferentiable hashing to elliptic
curves.
.- Cryptanalysis.
.- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy
Issues in SDSSE-CQ-S and VCDSSE.
.- Efficient and Optimized Modeling of S-Boxes.
.- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography.
.- Convolution-Friendly Image Compression with FHE.
.- Leveled Homomorphic Encryption over Composite Groups.
.- Activate Me!: Designing Efficient Activation Functions for
Privacy-Preserving Machine Learning with Fully Homomorphic Encryption.
.- One-Way Homomorphic Encryption: A Composite Group Approach.
.- Cryptanalysis of RSA.
.- A Novel Partial Key Exposure Attack on Common Prime RSA.
.- Improved Cryptanalysis of an RSA Variant Based on Cubic Pell Curve.
.- A New Generalized Attack on RSA-like Cryptosystems.
.- Cryptography Arithmetic.
.- An Improvement of the Congruence Solver of Lattice Isomorphism
Problem over Totally Real Number Fields and Applications.
.- PMNS arithmetic for elliptic curve cryptography.
.- Constant-time Integer Arithmetic for SQIsign.
.- FPTRU:Optimization of NTRU-Prime and TLS Performance Assessment.
.- Side-channel Attacks.
.- Simple Power Analysis Attack on SQIsign.
.- Correlation power analysis of LESS and CROSS.
.- TPL: Power Leakage Model Based on Technology Library.
.- Designs.
.- Bivariate proximity test-based Asynchronous Verifiable Secret Sharing.
.- Behemoth: transparent polynomial commitment scheme with constant
opening proof size and verifier time.
.- Attribute-based Encryption using Sum-Product Decomposition of
Boolean Functions.
.- Simultaneously simple universal and indifferentiable hashing to elliptic
curves.
.- Cryptanalysis.
.- Conjunctive Dynamic SSE Schemes under Scrutiny: Exposing Privacy
Issues in SDSSE-CQ-S and VCDSSE.
.- Efficient and Optimized Modeling of S-Boxes.
.- Tearing Solutions for Tree Traversal in Stateful Hash-based Cryptography.







