Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 16250)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2025.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 143 full papers included in the proceedings were carefully reviewed and selected from 533 submissions. These papers were organized into the following topical sections: Symmetric Cryptography; Cryptanalysis; Mathematic Aspects of Symmetric Cryptography; Secure Messaging; Formalization and Key Exchange; Data Structures; Blockchain; Secure Implementations; Design and Analysis of Implementations; Lattices; Post-Quantum Signatures; Groups and Group Actions; Isogenies; Multivariate Cryptanalysis and Code-based Crypto; Secure Computation; Succinct Proofs; Encryption with Advanced Features; Signatures with Advanced Features; Threshold Cryptography; Fully Homomorphic Encryption; Verifiable Computation; Pseudorandom Correlation; Secret Sharing; Quantum; and Foundations.
Similar content being viewed by others
Table of contents (19 papers)
-
Front Matter
-
Encryption with Advanced Features
-
Front Matter
-
-
Signatures with Advanced Features
-
Front Matter
-
-
Threshold Cryptography
-
Front Matter
-
Other volumes
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
-
Advances in Cryptology – ASIACRYPT 2025
Editors and Affiliations
Accessibility Information
PDF accessibility summary
This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.
EPUB accessibility summary
This ebook is designed with accessibility in mind, aiming to meet the ePub Accessibility 1.0 AA and WCAG 2.2 Level AA standards. It features a navigable table of contents, structured headings, and alternative text for images, ensuring smooth, intuitive navigation and comprehension. The text is reflowable and resizable, with sufficient contrast. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.
Bibliographic Information
Book Title: Advances in Cryptology – ASIACRYPT 2025
Book Subtitle: 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VI
Editors: Goichiro Hanaoka, Bo-Yin Yang
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-981-95-5119-4
Publisher: Springer Singapore
eBook Packages: Computer Science, Computer Science (R0), Springer Nature Proceedings Computer Science
Copyright Information: International Association for Cryptologic Research 2026
Softcover ISBN: 978-981-95-5118-7Published: 07 December 2025
eBook ISBN: 978-981-95-5119-4Published: 06 December 2025
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXII, 636
Number of Illustrations: 84 b/w illustrations, 18 illustrations in colour
Topics: Cryptology, Computer Communication Networks, Computer Applications, Security Services, Mobile and Network Security
Keywords
- cryptography
- computer security
- data privacy
- data security
- encryption
- network protocols
- public key cryptography
- authentication
- zero-knowledge
- multi-party computation
- symmetric key
- cryptanalysis
- side-channels
- post-quantum cryptography
- quantum
- anonymity
- proof systems
- computational complexity
- cryptographic protocols
- cryptographic implementations
