Security and Cryptography for Networks

5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. Proceedings

  • Roberto De Prisco
  • Moti Yung
Conference proceedings SCN 2006

DOI: 10.1007/11832072

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4116)

Table of contents (25 papers)

  1. Front Matter
  2. Distributed Systems Security: Foundations

    1. Edge Eavesdropping Games
      Amos Beimel, Matthew Franklin
      Pages 1-17
    2. Universally Composable Simultaneous Broadcast
      Alejandro Hevia
      Pages 18-33
  3. Signature Schemes Variants

    1. Relations Among Security Notions for Undeniable Signature Schemes
      Kaoru Kurosawa, Swee-Huay Heng
      Pages 34-48
    2. Concurrent Blind Signatures Without Random Oracles
      Aggelos Kiayias, Hong-Sheng Zhou
      Pages 49-62
    3. Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
      Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater
      Pages 63-77
  4. Block Ciphers Analysis

    1. Understanding Two-Round Differentials in AES
      Joan Daemen, Vincent Rijmen
      Pages 78-94
    2. Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b
      Jiqiang Lu, Changhoon Lee, Jongsung Kim
      Pages 95-110
  5. Anonymity and E-Commerce

    1. Constant-Size Dynamic k-TAA
      Man Ho Au, Willy Susilo, Yi Mu
      Pages 111-125
    2. On Secure Orders in the Presence of Faults
      Amir Herzberg, Igal Yoffe
      Pages 126-140
    3. Balancing Accountability and Privacy Using E-Cash (Extended Abstract)
      Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
      Pages 141-155
  6. Public Key Encryption and Key Exchange

    1. About the Security of MTI/C0 and MQV
      Sébastien Kunz-Jacques, David Pointcheval
      Pages 156-172
    2. A New Key Exchange Protocol Based on MQV Assuming Public Computations
      Sébastien Kunz-Jacques, David Pointcheval
      Pages 186-200
  7. Secret Sharing

    1. Cheating Immune (2,n)-Threshold Visual Secret Sharing
      Roberto De Prisco, Alfredo De Santis
      Pages 216-228
    2. Rational Secret Sharing, Revisited
      S. Dov Gordon, Jonathan Katz
      Pages 229-241
  8. Symmetric Key Cryptanalysis and Randomness

    1. On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
      Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
      Pages 242-256
    2. Distinguishing Stream Ciphers with Convolutional Filters
      Joan Daemen, Gilles Van Assche
      Pages 257-270
    3. On Statistical Testing of Random Numbers Generators
      F. El Haje, Y. Golubev, P. -Y. Liardet, Y. Teglia
      Pages 271-287

About these proceedings

Introduction

The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to better describe the scope of the conference while preserving the SCN acronym. This year for the ?rst time we had the proceedings volume ready at the conference. We feel thatthe SCN conferencehas maturedandthat it has becomea tradition to hold it regularly in the beautiful setting of the Amal?tan coast as a biennial event. Theconferencebroughttogetherresearchersinthe?eldsofcryptographyand security in order to foster the extension of cooperation and exchange of ideas among them, aiming at assuring safety and trustworthiness of communication networks. The topics covered by the conference this year included: foundations of distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption and key exchange, secret sharing, symmetric and public key cryptanalysis, randomness, authentication. The international Program Committee consisted of 24 members who are top experts in the conference ?elds. We received 81 submissions amongst which 24 papers were selected for presentation at the conference. These proceedings - clude the extended abstract versions of the 24 accepted papers and the short abstract of the invited talk by Ivan Damg? ard.

Keywords

AES Advanced Encryption Standard Communication Security DES Digital Signature Schemes Distributed Systems Security HAVAL Multiparty Computation Network Security Public Key Cryptography Secure Communication Secure Networking cryptography cryptology

Editors and affiliations

  • Roberto De Prisco
    • 1
  • Moti Yung
    • 2
  1. 1.Dipartimento di Informatica ed ApplicazioniUniversità di SalernoFisciano (SA)Italy
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-38080-1
  • Online ISBN 978-3-540-38081-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349