Provable Security

7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings

  • Willy Susilo
  • Reza Reyhanitabar
Conference proceedings ProvSec 2013

DOI: 10.1007/978-3-642-41227-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8209)

Table of contents

  1. Front Matter
  2. Invited Talk

    1. Serge Vaudenay
      Pages 1-20
  3. Key Exchange Protocols

    1. S. Sree Vivek, S. Sharmila Deva Selvi, Layamrudhaa Renganathan Venkatesan, C. Pandu Rangan
      Pages 38-58
    2. Cristian Ene, Clémentine Gritti, Yassine Lakhnech
      Pages 59-85
  4. Security Models

    1. Prabhanjan Ananth, Raghav Bhaskar
      Pages 86-103
    2. Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu
      Pages 139-153
  5. Signature and Signcryption Schemes

    1. Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei
      Pages 154-164
    2. Hui Cui, Yi Mu, Man Ho Au
      Pages 165-183
  6. Authenticated Encryption

  7. Theory

    1. Xianhui Lu, Bao Li, Yamin Liu
      Pages 239-248
    2. Nirattaya Khamsemanan, William E. Skeith III
      Pages 249-270
  8. Public Key Encryption

    1. Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei
      Pages 271-287
    2. Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka
      Pages 309-329
    3. Hui Guo, Zhenfeng Zhang, Jiang Zhang, Cheng Chen
      Pages 330-346

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Keywords

authentication ciphers computational efficiency re-encryption schemes verification attack

Editors and affiliations

  • Willy Susilo
    • 1
  • Reza Reyhanitabar
    • 2
  1. 1.Centre for Computer and Information Security Research, School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia
  2. 2.École Polytechnique Fédérale de LausanneLausanneSwitzerland

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-41226-4
  • Online ISBN 978-3-642-41227-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349