Advances in Cryptology - EUROCRYPT 2026 : 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Rome, Italy, May 10-14, 2026, Proceedings, Part II (Lecture Notes in Computer Science)

個数:
  • 予約

Advances in Cryptology - EUROCRYPT 2026 : 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Rome, Italy, May 10-14, 2026, Proceedings, Part II (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032253163

Full Description

This seven-volume set, LNCS 16541-16547, constitutes the proceedings of the 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2026, held in Rome, Italy, during May 10-14, 2026.

The 142 papers included in these proceedings were carefully reviewed and selected from 675 submissions. They are organized in topical sections as follows:
Part I: Signatures; Quantum Cryptography
Part II: Applied Cryptography
Part III: Multi-Party Computation
Part IV: Post-Quantum Cryptography
Part V: Foundations
Part VI: Symmetric Cryptography and Related Techniques
Part VII: Zero-Knowledge; Hardware and Embedded Systems

Contents

.- Applied Cryptography.
.- ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420.
.- Group Key Progression: Strong Security for Shared Persistent Data.
.- Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions.
.- Combining Oblivious Pseudorandom Functions.
.- Two-Factor Authentication Can Harden Servers Against Offline Password Search.
.- Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols.
.- At-Compromise Security: The Case for Alert Blindness.
.- Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability.
.- Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH.
.- OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security.
.- Computationally Succinct Authentication from DCR: Attribute-Based Laconic Function Evaluation and More.
.- Device-Bound Anonymous Credentials With(out) Trusted Hardware.
.- Updatable Private Set Intersection from Symmetric-Key Techniques.
.- Malicious Private Set Union with Two-Sided Output.
.- Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters.
.- Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange.
.- Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions.

最近チェックした商品