Full Description
This seven-volume set, LNCS 16541-16547, constitutes the proceedings of the 45th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2026, held in Rome, Italy, during May 10-14, 2026.
The 142 papers included in these proceedings were carefully reviewed and selected from 675 submissions. They are organized in topical sections as follows:
Part I: Signatures; Quantum Cryptography
Part II: Applied Cryptography
Part III: Multi-Party Computation
Part IV: Post-Quantum Cryptography
Part V: Foundations
Part VI: Symmetric Cryptography and Related Techniques
Part VII: Zero-Knowledge; Hardware and Embedded Systems
Contents
.- Applied Cryptography.
.- ETK: External-Operations TreeKEM and the Security of MLS in RFC 9420.
.- Group Key Progression: Strong Security for Shared Persistent Data.
.- Secure Cloud Storage: Modularization, Network Adversaries and Adaptive Corruptions.
.- Combining Oblivious Pseudorandom Functions.
.- Two-Factor Authentication Can Harden Servers Against Offline Password Search.
.- Provable Security and Privacy Analysis of WPA3's SAE and SAE-PK Protocols.
.- At-Compromise Security: The Case for Alert Blindness.
.- Bird of Prey: Practical Signature Combiners Preserving Strong Unforgeability.
.- Fully-Adaptive Two-Round Threshold Schnorr Signatures from DDH.
.- OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security.
.- Computationally Succinct Authentication from DCR: Attribute-Based Laconic Function Evaluation and More.
.- Device-Bound Anonymous Credentials With(out) Trusted Hardware.
.- Updatable Private Set Intersection from Symmetric-Key Techniques.
.- Malicious Private Set Union with Two-Sided Output.
.- Is PSI Really Faster Than PSU? Achieving Efficient PSU with Invertible Bloom Filters.
.- Conditionally Input-Revealing 2PC and Fuzzy Password-Authenticated Key Exchange.
.- Post-Quantum TLS 1.3 Handshake from CPA-Secure KEMs with Tighter Reductions.



