


default search action
45th CRYPTO 2025, Santa Barbara, CA, USA - Part III
- Yael Tauman Kalai, Seny F. Kamara:
Advances in Cryptology - CRYPTO 2025 - 45th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2025, Proceedings, Part III. Lecture Notes in Computer Science 16002, Springer 2025, ISBN 978-3-032-01880-9
Advanced Encryption Schemes
- Jeffrey Champion, Yao-Ching Hsieh, David J. Wu:
Registered ABE and Adaptively-Secure Broadcast Encryption from Succinct LWE. 3-34 - Fuyuki Kitagawa, Ryo Nishimaki, Nikhil Pappu:
PKE and ABE with Collusion-Resistant Secure Key Leasing. 35-68 - Amit Agarwal, Rex Fernando, Benny Pinkas:
Efficiently-Thresholdizable Batched Identity Based Encryption, with Applications. 69-100 - Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree:
A Note on Adaptive Security in Hierarchical Identity-Based Encryption. 101-136 - Kaartik Bhushan, Alexis Korb
, Amit Sahai
:
Dynamic Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions. 137-169 - Shuai Han
, Hongxu Yi, Shengli Liu
, Dawu Gu
:
Tightly Secure Inner-Product Functional Encryption Revisited: Compact, Lattice-Based, and More. 170-203 - Hoeteck Wee, David J. Wu:
Unbounded Distributed Broadcast Encryption and Registered ABE from Succinct LWE. 204-235 - Damiano Abram
, Giulio Malavolta
, Lawrence Roy
:
Key-Homomorphic Computations for RAM: Fully Succinct Randomised Encodings and More. 236-268 - Yijia Chang, Rongmao Chen, Chao Lin, Songze Li, Xinyi Huang:
Resolving the Efficiency-Utility Dilemma of Threshold Linearly Homomorphic Encryption via Message-Space Adapter. 269-303 - Andreea Alexandru, Andrey Kim, Yuriy Polyakov
:
General Functional Bootstrapping Using CKKS. 304-337 - Dan Boneh, Jaehyung Kim:
Homomorphic Encryption for Large Integers from Nested Residue Number Systems. 338-370 - Rupeng Yang, Zuoxia Yu, Willy Susilo
:
Fully Homomorphic Encryption with Chosen-Ciphertext Security from LWE. 371-405 - Abhishek Jain
, Zhengzhong Jin
:
Sometimes-Decryptable Homomorphic Encryption from Sub-exponential DDH. 406-439 - Yevgeniy Dodis
, Eli Goldin
:
Anamorphic-Resistant Encryption; Or Why the Encryption Debate is Still Alive. 440-471 - Davide Carnemolla, Dario Catalano, Emanuele Giunta, Francesco Migliaro:
Anamorphic Resistant Encryption: the Good, the Bad and the Ugly. 472-503 - Sanjam Garg, Mohammad Hajiabadi, Dimitris Kolonelos, Abhiram Kothapalli, Guru-Vamsi Policharla:
A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications. 504-539
Key Exchange and Generation
- Lewis Glabush, Felix Günther, Kathrin Hövelmanns
, Douglas Stebila
:
Verifiable Decapsulation: Recognizing Faulty Implementations of Post-quantum KEMs. 543-574 - Felix Günther, Michael Rosenberg
, Douglas Stebila
, Shannon Veitch
:
Hybrid Obfuscated Key Exchange and KEMs. 575-609 - Ian McQuoid, Mike Rosulek, Jiayu Xu:
How to Tolerate Typos in Strong Asymmetric PAKE. 610-641 - Hanwen Feng
, Qiang Tang:
Asymptotically Optimal Adaptive Asynchronous Common Coin and DKG with Silent Setup. 642-675

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.