Skip to main content

Advances in Cryptology – ASIACRYPT 2025

31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025, Proceedings, Part VI

  • Conference proceedings
  • © 2026

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 16250)

Included in the following conference series:

Conference proceedings info: ASIACRYPT 2025.

  • 14k Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook EUR 82.38
Price includes VAT (Netherlands)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book EUR 106.81
Price includes VAT (Netherlands)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.

The 143 full papers included in the proceedings were carefully reviewed and selected from 533 submissions. These papers were organized into the following topical sections: Symmetric Cryptography; Cryptanalysis; Mathematic Aspects of Symmetric Cryptography; Secure Messaging; Formalization and Key Exchange; Data Structures; Blockchain; Secure Implementations; Design and Analysis of Implementations; Lattices; Post-Quantum Signatures; Groups and Group Actions; Isogenies; Multivariate Cryptanalysis and Code-based Crypto; Secure Computation; Succinct Proofs; Encryption with Advanced Features; Signatures with Advanced Features; Threshold Cryptography; Fully Homomorphic Encryption; Verifiable Computation; Pseudorandom Correlation; Secret Sharing; Quantum; and Foundations.

Similar content being viewed by others

Table of contents (19 papers)

  1. Encryption with Advanced Features

  2. Signatures with Advanced Features

  3. Threshold Cryptography

Editors and Affiliations

  • National Institute of Advanced Industrial Science and Technology, Tokyo, Japan

    Goichiro Hanaoka

  • Academia Sinica, Taipei, Taiwan

    Bo-Yin Yang

Accessibility Information

PDF accessibility summary

This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.

EPUB accessibility summary

This ebook is designed with accessibility in mind, aiming to meet the ePub Accessibility 1.0 AA and WCAG 2.2 Level AA standards. It features a navigable table of contents, structured headings, and alternative text for images, ensuring smooth, intuitive navigation and comprehension. The text is reflowable and resizable, with sufficient contrast. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.

Bibliographic Information

Keywords

Publish with us