Security and Cryptography for Networks

5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings

Editors:

ISBN: 978-3-540-38080-1 (Print) 978-3-540-38081-8 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Distributed Systems Security: Foundations

    1. No Access

      Book Chapter

      Pages 1-17

      Edge Eavesdropping Games

    2. No Access

      Book Chapter

      Pages 18-33

      Universally Composable Simultaneous Broadcast

  3. Signature Schemes Variants

    1. No Access

      Book Chapter

      Pages 34-48

      Relations Among Security Notions for Undeniable Signature Schemes

    2. No Access

      Book Chapter

      Pages 49-62

      Concurrent Blind Signatures Without Random Oracles

    3. No Access

      Book Chapter

      Pages 63-77

      Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions

  4. Block Ciphers Analysis

    1. No Access

      Book Chapter

      Pages 78-94

      Understanding Two-Round Differentials in AES

    2. No Access

      Book Chapter

      Pages 95-110

      Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b

  5. Anonymity and E-Commerce

    1. No Access

      Book Chapter

      Pages 111-125

      Constant-Size Dynamic k-TAA

    2. No Access

      Book Chapter

      Pages 126-140

      On Secure Orders in the Presence of Faults

    3. No Access

      Book Chapter

      Pages 141-155

      Balancing Accountability and Privacy Using E-Cash (Extended Abstract)

  6. Public Key Encryption and Key Exchange

    1. No Access

      Book Chapter

      Pages 156-172

      About the Security of MTI/C0 and MQV

    2. No Access

      Book Chapter

      Pages 173-185

      Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles

    3. No Access

      Book Chapter

      Pages 186-200

      A New Key Exchange Protocol Based on MQV Assuming Public Computations

  7. Secret Sharing

    1. No Access

      Book Chapter

      Pages 201-215

      Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants

    2. No Access

      Book Chapter

      Pages 216-228

      Cheating Immune (2,n)-Threshold Visual Secret Sharing

    3. No Access

      Book Chapter

      Pages 229-241

      Rational Secret Sharing, Revisited

  8. Symmetric Key Cryptanalysis and Randomness

    1. No Access

      Book Chapter

      Pages 242-256

      On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)

    2. No Access

      Book Chapter

      Pages 257-270

      Distinguishing Stream Ciphers with Convolutional Filters

    3. No Access

      Book Chapter

      Pages 271-287

      On Statistical Testing of Random Numbers Generators

  9. Applied Authentication

    1. No Access

      Book Chapter

      Pages 288-302

      Lightweight Email Signatures (Extended Abstract)

previous Page of 2