Security and Cryptography for Networks

6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

  • Editors
  • Rafail Ostrovsky
  • Roberto De Prisco
  • Ivan Visconti
Conference proceedings SCN 2008

DOI: 10.1007/978-3-540-85855-3

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5229)

Table of contents (27 papers)

  1. Front Matter
  2. Invited Talk

  3. Session 1: Implementations

    1. CLL: A Cryptographic Link Layer for Local Area Networks
      Yves Igor Jerschow, Christian Lochert, Björn Scheuermann, Martin Mauve
      Pages 21-38
  4. Session 2: Protocols I

    1. Privacy Preserving Data Mining within Anonymous Credential Systems
      Aggelos Kiayias, Shouhuai Xu, Moti Yung
      Pages 57-76
    2. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
      Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 77-91
  5. Session 3: Encryption I

  6. Session 4: Encryption II

    1. General Certificateless Encryption and Timed-Release Encryption
      Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
      Pages 126-143
    2. Efficient Certificate-Based Encryption in the Standard Model
      Joseph K. Liu, Jianying Zhou
      Pages 144-155
  7. Session 5: Primitives

    1. An Improved Robust Fuzzy Extractor
      Bhavana Kanukurthi, Leonid Reyzin
      Pages 156-171
    2. On Linear Secret Sharing for Connectivity in Directed Graphs
      Amos Beimel, Anat Paskin
      Pages 172-184
  8. Session 6: Signatures

    1. Expressive Subgroup Signatures
      Xavier Boyen, Cécile Delerablée
      Pages 185-200
    2. Anonymous Proxy Signatures
      Georg Fuchsbauer, David Pointcheval
      Pages 201-217
  9. Session 7: Hardware and Cryptanalysis

    1. Using Normal Bases for Compact Hardware Implementations of the AES S-Box
      Svetla Nikova, Vincent Rijmen, Martin Schläffer
      Pages 236-245
    2. A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
      Marco Baldi, Marco Bodrato, Franco Chiaraluce
      Pages 246-262
    3. Full Cryptanalysis of LPS and Morgenstern Hash Functions
      Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
      Pages 263-277
    4. A New DPA Countermeasure Based on Permutation Tables
      Jean-Sébastien Coron
      Pages 278-292

About these proceedings


This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.

The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.


AES DES Padding S-Box advanced encryption standard anonymity communication security cryptanalysis cryptography cryptology digital signature schemes distributed systems security efficiency elliptic curve cryptography embedded cryptography

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85854-6
  • Online ISBN 978-3-540-85855-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349