Security and Cryptography for Networks

9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

  • Michel Abdalla
  • Roberto De Prisco
Conference proceedings SCN 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8642)

Table of contents

  1. Front Matter
  2. Key Exchange

    1. Eduarda S. V. Freire, Julia Hesse, Dennis Hofheinz
      Pages 1-20
    2. David Pointcheval, Olivier Sanders
      Pages 21-39
    3. Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, Yevgeniy Vahlis
      Pages 40-56
  3. Multilinear Maps and Obfuscation

    1. Omkant Pandey, Kim Ramchen, Brent Waters
      Pages 57-76
    2. Antonio Marcedone, Claudio Orlandi
      Pages 77-90
  4. Invited Talk I

  5. Pseudorandom Function Extensions

    1. Georg Fuchsbauer
      Pages 95-114
  6. Secure Computation – Foundations and Algorithms

    1. Joshua Lampkins, Rafail Ostrovsky
      Pages 155-174
    2. Carsten Baum, Ivan Damgård, Claudio Orlandi
      Pages 175-196
    3. Ashish Choudhury, Arpita Patra, Nigel P. Smart
      Pages 197-217
  7. Network Security

    1. Daniel V. Bailey, Markus Dürmuth, Christof Paar
      Pages 218-235
    2. Paul Giura, Vladimir Kolesnikov, Aris Tentes, Yevgeniy Vahlis
      Pages 236-254
    3. Andrea G. Forte, Juan A. Garay, Trevor Jim, Yevgeniy Vahlis
      Pages 255-276
  8. Functional Encryption

  9. Invited Talk II

  10. Cryptanalysis

  11. Secure Computation – Implementation

    1. Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen
      Pages 358-379
    2. Jason Perry, Debayan Gupta, Joan Feigenbaum, Rebecca N. Wright
      Pages 380-397
    3. Ivan Damgård, Rasmus Lauritsen, Tomas Toft
      Pages 398-415
  12. Zero Knowledge

    1. Muthuramakrishnan Venkitasubramaniam
      Pages 455-475
  13. Message Authentication

    1. Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov
      Pages 476-493
    2. Yevgeniy Dodis, Dario Fiore
      Pages 494-513
  14. Invited Talk III

  15. Proofs of Space and Erasure

    1. Nikolaos P. Karvelas, Aggelos Kiayias
      Pages 520-537
    2. Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi
      Pages 538-557
  16. Public-Key Encryption

    1. Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro
      Pages 558-577
    2. Rafail Ostrovsky, Vanishree Rao, Ivan Visconti
      Pages 578-597
    3. David Naccache, Rainer Steinwandt, Adriana Suárez Corona, Moti Yung
      Pages 598-607
  17. Back Matter

About these proceedings


This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.


computer networks cryptanalysis and other attacks cryptography encryption information security intrusion detection key management multi-party computation network security security and privacy security services

Editors and affiliations

  • Michel Abdalla
    • 1
  • Roberto De Prisco
    • 2
  1. 1.École Normale Supérieure & CNRSParisFrance
  2. 2.Dipartimento di InformaticaUniversità di SalernoFiscianoItaly

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-10878-0
  • Online ISBN 978-3-319-10879-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site