Security and Cryptography for Networks

6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

  • Editors
  • Rafail Ostrovsky
  • Roberto De Prisco
  • Ivan Visconti

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5229)

Table of contents

  1. Front Matter
  2. Invited Talk

  3. Session 1: Implementations

    1. Yves Igor Jerschow, Christian Lochert, Björn Scheuermann, Martin Mauve
      Pages 21-38
  4. Session 2: Protocols I

    1. Aggelos Kiayias, Shouhuai Xu, Moti Yung
      Pages 57-76
    2. Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 77-91
  5. Session 3: Encryption I

  6. Session 4: Encryption II

    1. Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
      Pages 126-143
    2. Joseph K. Liu, Jianying Zhou
      Pages 144-155
  7. Session 5: Primitives

    1. Bhavana Kanukurthi, Leonid Reyzin
      Pages 156-171
    2. Amos Beimel, Anat Paskin
      Pages 172-184
  8. Session 6: Signatures

    1. Xavier Boyen, Cécile Delerablée
      Pages 185-200
    2. Georg Fuchsbauer, David Pointcheval
      Pages 201-217
  9. Session 7: Hardware and Cryptanalysis

    1. Svetla Nikova, Vincent Rijmen, Martin Schläffer
      Pages 236-245
    2. Marco Baldi, Marco Bodrato, Franco Chiaraluce
      Pages 246-262
    3. Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
      Pages 263-277
    4. Jean-Sébastien Coron
      Pages 278-292

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.

The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.

Keywords

AES DES Padding S-Box advanced encryption standard anonymity communication security cryptanalysis cryptography cryptology digital signature schemes distributed systems security efficiency elliptic curve cryptography embedded cryptography

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85855-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85854-6
  • Online ISBN 978-3-540-85855-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book