


default search action
44th EUROCRYPT 2025: Madrid, Spain - Part II
- Serge Fehr, Pierre-Alain Fouque
:
Advances in Cryptology - EUROCRYPT 2025 - 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Madrid, Spain, May 4-8, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15602, Springer 2025, ISBN 978-3-031-91123-1
Public-Key Cryptography and Key-Exchange
- Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Tauman Kalai, Vinod Vaikuntanathan:
Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN. 3-33 - Benoît Libert:
Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-Type Encryption. 34-63 - Riddhi Ghosal, Aayush Jain, Paul Lou
, Amit Sahai
, Neekon Vafa
:
Post-quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN. 64-93 - Andrea Basso
, Luciano Maino:
POKÉ: A Compact and Efficient PKE from Higher-Dimensional Isogenies. 94-123 - Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Tang Gang, Yanbin Pan, Xiaoyun Wang:
Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions. 124-153 - Clémence Chevignard, Guilhem Mureau, Thomas Espitau
, Alice Pellet-Mary
, Heorhii Pliatsok, Alexandre Wallet
:
A Reduction from Hawk to the Principal Ideal Problem in a Quaternion Algebra. 154-183 - Bill Allombert
, Alice Pellet-Mary
, Wessel P. J. van Woerden
:
Cryptanalysis of Rank-2 Module-LIP: A Single Real Embedding Is All It Takes. 184-212 - Xiuhan Lin
, Mehdi Tibouchi
, Yang Yu
, Shiduo Zhang:
Do Not Disturb a Sleeping Falcon - Floating-Point Error Sensitivity of the Falcon Sampler and Its Consequences. 213-244 - Kathrin Hövelmanns
, Andreas Hülsing
, Christian Majenz
, Fabrizio Sisinni:
(Un)breakable Curses - Re-encryption in the Fujisaki-Okamoto Transform. 245-274 - Dario Catalano
, Emanuele Giunta
, Francesco Migliaro:
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions. 275-303 - Renas Bacho, Sourav Das
, Julian Loss
, Ling Ren
:
Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security. 304-334 - Anja Lehmann
, Phillip Nazarian, Cavit Özbay
:
Stronger Security for Threshold Blind Signatures. 335-364 - Lucjan Hanzlik, Eugenio Paracucchi, Riccardo Zanotto:
Non-interactive Blind Signatures from RSA Assumption and More. 365-394 - Julia Hesse
, Michael Rosenberg
:
PAKE Combiners and Efficient Post-quantum Instantiations. 395-420 - You Lyu
, Shengli Liu
:
Hybrid Password Authentication Key Exchange in the UC Framework. 421-450 - Jake Januzelli, Lawrence Roy, Jiayu Xu
:
Under What Conditions Is Encrypted Key Exchange Actually Secure? 451-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.