Security and Cryptography for Networks

8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings

  • Ivan Visconti
  • Roberto De Prisco
Conference proceedings SCN 2012

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7485)

Table of contents

  1. Front Matter
  2. Cryptography from Lattices

    1. Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
      Pages 19-37
    2. Jan Camenisch, Gregory Neven, Markus Rückert
      Pages 57-75
  3. Signature Schemes

    1. Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev
      Pages 76-94
    2. Olivier Blazy, David Pointcheval, Damien Vergnaud
      Pages 95-112
    3. Marc Fischlin, Anja Lehmann, Dominique Schröder
      Pages 113-130
  4. Encryption Schemes I

    1. Duong Hieu Phan, David Pointcheval, Mario Strefler
      Pages 166-183
    2. Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai
      Pages 184-204
  5. Efficient Two-Party and Multi-Party Computation

    1. Vladimir Kolesnikov, Ranjit Kumaresan
      Pages 205-221
    2. Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
      Pages 222-240
    3. Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart
      Pages 241-263
  6. Security in the UC Framework

    1. Seung Geol Choi, Dana Dachman-Soled, Moti Yung
      Pages 264-280
    2. Ran Canetti, Margarita Vald
      Pages 281-301
  7. Cryptanalysis

    1. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu
      Pages 302-325
    2. Gottfried Herold, Alexander Meurer
      Pages 326-342
    3. Céline Blondeau, Benoît Gérard, Kaisa Nyberg
      Pages 343-360

About these proceedings

Introduction

This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.

The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.

Keywords

homomorphic encryption multiple differential cryptanalysis public key encryption secure computation structure-preserving signatures

Editors and affiliations

  • Ivan Visconti
    • 1
  • Roberto De Prisco
    • 1
  1. 1.Dipartimento di InformaticaUniversità di SalernoFiscianoItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-32928-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-32927-2
  • Online ISBN 978-3-642-32928-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book