Security in Communication Networks

Third International Conference, SCN 2002 Amalfi, Italy, September 11–13, 2002 Revised Papers

Editors:

ISBN: 978-3-540-00420-2 (Print) 978-3-540-36413-9 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Invited Talks

    1. No Access

      Book Chapter

      Pages 1-13

      Some Applications of Polynomials for the Design of Cryptographic Protocols

    2. No Access

      Book Chapter

      Pages 14-28

      Secure Multi-party Computation Made Simple

  2. Forward Security

    1. No Access

      Book Chapter

      Pages 29-44

      Forward Secrecy in Password-Only Key Exchange Protocols

    2. No Access

      Book Chapter

      Pages 45-54

      Weak Forward Security in Mediated RSA

  3. Foundations of Cryptography

    1. No Access

      Book Chapter

      Pages 55-73

      On the Power of Claw-Free Permutations

    2. No Access

      Book Chapter

      Pages 74-87

      Equivocable and Extractable Commitment Schemes

    3. No Access

      Book Chapter

      Pages 88-101

      An Improved Pseudorandom Generator Based on Hardness of Factoring

    4. No Access

      Book Chapter

      Pages 102-118

      Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions

  4. Key Management

    1. No Access

      Book Chapter

      Pages 119-132

      Efficient Re-keying Protocols for Multicast Encryption

    2. No Access

      Book Chapter

      Pages 133-145

      On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure

    3. No Access

      Book Chapter

      Pages 146-163

      A Group Key Distribution Scheme with Decentralised User Join

  5. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 164-173

      On a Resynchronization Weakness in a Class of Combiners with Memory

    2. No Access

      Book Chapter

      Pages 174-185

      On Probability of Success in Linear and Differential Cryptanalysis

    3. No Access

      Book Chapter

      Pages 186-198

      Differential Cryptanalysis of a Reduced-Round SEED

  6. System Security

    1. No Access

      Book Chapter

      Pages 199-218

      Medical Information Privacy Assurance: Cryptographic and System Aspects

    2. No Access

      Book Chapter

      Pages 219-233

      A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code

  7. Signature Schemes

    1. No Access

      Book Chapter

      Pages 234-240

      How to Repair ESIGN

    2. No Access

      Book Chapter

      Pages 241-256

      Forward-Secure Signatures with Fast Key Update

    3. No Access

      Book Chapter

      Pages 257-267

      Constructing Elliptic Curves with Prescribed Embedding Degrees

    4. No Access

      Book Chapter

      Pages 268-289

      A Signature Scheme with Efficient Protocols

previous Page of 2