LEADER 04688nam 22007695 450 001 996655264803316 005 20250618151539.0 010 $a3-031-91092-3 024 7 $a10.1007/978-3-031-91092-0 035 $a(CKB)38641851000041 035 $a(DE-He213)978-3-031-91092-0 035 $a(MiAaPQ)EBC32047795 035 $a(Au-PeEL)EBL32047795 035 $a(EXLCZ)9938641851000041 100 $a20250428d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology ? EUROCRYPT 2025 $e44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4?8, 2025, Proceedings, Part V /$fedited by Serge Fehr, Pierre-Alain Fouque 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (XX, 486 p. 63 illus., 18 illus. in color.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15605 311 08$a3-031-91091-5 327 $aSecure Multiparty Computation II: Multi-key Homomorphic Secret Sharing -- Disincentivize Collusion in Veri able Secret Sharing -- Juggernaut: Efficient Crypto-Agnostic Byzantine Agreement -- MiniCast: Minimizing the Communication Complexity of Reliable Broadcast -- Asymptotically Optimal Early Termination for Dishonest Majority Broadcast -- Efficient Pseudorandom Correlation Generators for Any Finite Field -- Efficient Distributed Randomness Generation from Minimal Assumptions where PArties Speak Sequentially Once -- Simultaneous-Message and Succinct Secure Computation -- Efficient Multiparty Private Simultaneous Messages for Symmetric Functions -- MPC with Publicly Identi able Abort from Pseudorandomness and Homomorphic Encryption -- The Complexity of Memory Checking with Covert Security -- Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions -- Black-Box Constant-Round Secure 2PC with Succinct Communication -- Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries -- Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC -- Honest Majority MPC with Õ(/C/) Communication in Minicrypt. 330 $aThis eight-volume set, LNCS 15601-15608, constitutes the proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025, held in Madrid, Spain, during May 4?8, 2025. The 123 papers included in these proceedings were carefully reviewed and selected from 602 submissions. They are organized in topical sections as follows: Part I: Secure Multiparty Computation I Part II: Public-Key Cryptography and Key-Exchange Part III: Advanced Cryptographic Schemes Part IV: (Non-)Interactive Proofs and Zero-Knowledge Part V: Secure Multiparty Computation II Part VI: MPC II: Private Information Retrieval and Garbling; Algorithms and Attacks Part VII: Theoretical Foundations Part VIII: Real-World Cryptography. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15605 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aApplication software 606 $aData protection 606 $aCryptology 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSecurity Services 606 $aXifratge (Informātica)$2thub 606 $aSeguretat informātica$2thub 608 $aCongressos$2thub 608 $aLlibres electrōnics$2thub 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aData protection. 615 14$aCryptology. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSecurity Services. 615 7$aXifratge (Informātica) 615 7$aSeguretat informātica 676 $a005.824 702 $aFehr$b S$g(Serge),$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFouque$b Pierre-Alain$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996655264803316 996 $aAdvances in Cryptology ? EUROCRYPT 2025$94373624 997 $aUNISA