04644nam 22007695 450 99665526430331620250618150539.03-031-91107-510.1007/978-3-031-91107-1(CKB)38641704200041(DE-He213)978-3-031-91107-1(MiAaPQ)EBC32029826(Au-PeEL)EBL32029826(EXLCZ)993864170420004120250427d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – EUROCRYPT 2025 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques Madrid, Spain, May 4–8, 2025, Proceedings, Part I /edited by Serge Fehr, Pierre-Alain Fouque1st ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (XX, 460 p. 72 illus., 46 illus. in color.)Lecture Notes in Computer Science,1611-3349 ;156013-031-91106-7 Secure Multiparty Computation I: Towards Optimally Secure Deterministic Authenticated Encryption Schemes -- Making GCM Great Again: Toward Full Security and Longer Nonces -- Efficient Instances of Docked Double Decker With AES, and Application to Authenticated Encryption -- Committing Authenticated Encryption: Generic Transforms with Hash Functions -- The Impact of Reversibility on Parallel Pebbling -- Constructing Quantum Implementations with the Minimal T-depth or Minimal Width and Their Applications -- Binary Codes for Error Detection and Correction in a Computationally Bounded World -- ChiLow and ChiChi: New Constructions for Code Encryption -- Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis -- Random Oracle Combiners: Merkle-Damg ard Style -- Gröbner Basis Cryptanalysis of Anemoi -- Preimage Attacks on up to 5 Rounds of SHA-3 Using Internal Differentials -- Polynomial Time Cryptanalytic Extraction of Deep Neural Networks in the Hard-Label Setting -- Cryptanalysis of Full SCARF -- Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing.This eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4–8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography.Lecture Notes in Computer Science,1611-3349 ;15601CryptographyData encryption (Computer science)Computer networksSecurity measuresComputer networksApplication softwareData protectionCryptologyMobile and Network SecurityComputer Communication NetworksComputer and Information Systems ApplicationsSecurity ServicesXifratge (Informàtica)thubSeguretat informàticathubCongressosthubLlibres electrònicsthubCryptography.Data encryption (Computer science)Computer networksSecurity measures.Computer networks.Application software.Data protection.Cryptology.Mobile and Network Security.Computer Communication Networks.Computer and Information Systems Applications.Security Services.Xifratge (Informàtica)Seguretat informàtica005.824Fehr S(Serge),edthttp://id.loc.gov/vocabulary/relators/edtFouque Pierre-Alainedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996655264303316Advances in Cryptology – EUROCRYPT 20254373624UNISA