Security in Communication Networks

4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers

Editors:

ISBN: 978-3-540-24301-4 (Print) 978-3-540-30598-9 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talk

    1. No Access

      Book Chapter

      Pages 1-15

      ECRYPT: The Cryptographic Research Challenges for the Next Decade

  3. Reduction of Security/Primitives

    1. No Access

      Book Chapter

      Pages 16-32

      Relationships Between Diffie-Hellman and “Index Oracles”

    2. No Access

      Book Chapter

      Pages 33-46

      On the Security Notions for Public-Key Encryption Schemes

    3. No Access

      Book Chapter

      Pages 47-59

      Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel

  4. Signature Schemes

    1. No Access

      Book Chapter

      Pages 60-76

      A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs

    2. No Access

      Book Chapter

      Pages 77-90

      Group Signatures with Separate and Distributed Authorities

    3. No Access

      Book Chapter

      Pages 91-104

      Threshold Cryptography in Mobile Ad Hoc Networks

  5. Anonymity and Privacy

    1. No Access

      Book Chapter

      Pages 105-119

      Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map

    2. No Access

      Book Chapter

      Pages 120-133

      Group Signatures: Better Efficiency and New Theoretical Aspects

    3. No Access

      Book Chapter

      Pages 134-148

      Efficient Blind Signatures Without Random Oracles

  6. Authentication and Identification

    1. No Access

      Book Chapter

      Pages 149-164

      Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract)

    2. No Access

      Book Chapter

      Pages 165-179

      On the Key Exposure Problem in Chameleon Hashes

  7. Zero Knowledge

    1. No Access

      Book Chapter

      Pages 180-192

      Identity-Based Zero-Knowledge

  8. Public Key Cryptosystems

    1. No Access

      Book Chapter

      Pages 193-207

      A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation

    2. No Access

      Book Chapter

      Pages 208-219

      Efficient Key Encapsulation to Multiple Parties

    3. No Access

      Book Chapter

      Pages 220-234

      Improved Signcryption from q-Diffie-Hellman Problems

  9. Distributed Cryptography

    1. No Access

      Book Chapter

      Pages 235-248

      Colored Visual Cryptography Without Color Darkening

    2. No Access

      Book Chapter

      Pages 249-262

      On the Size of Monotone Span Programs

    3. No Access

      Book Chapter

      Pages 263-277

      Universally Composable DKG with Linear Number of Exponentiations

  10. Cryptanalysis of Public Key Cryptosystems

    1. No Access

      Book Chapter

      Pages 278-293

      An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations

previous Page of 2