Advertisement

Provable Security

Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

  • Joonsang Baek
  • Feng Bao
  • Kefei Chen
  • Xuejia Lai
Conference proceedings ProvSec 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5324)

Table of contents

  1. Front Matter
  2. Encryption

    1. Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao
      Pages 1-21
    2. Sherman S. M. Chow, S. M. Yiu
      Pages 38-51
    3. S. Sharmila Deva Selvi, S. Sree Vivek, Deepanshu Shukla, Pandu Rangan Chandrasekaran
      Pages 52-67
    4. Yvo Desmedt, Duong Hieu Phan
      Pages 68-82
  3. Signature

    1. Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li
      Pages 83-97
    2. Kristian Gjøsteen, Lillian Kråkmo
      Pages 112-126
    3. Zhenhua Liu, Yupu Hu, Hua Ma
      Pages 127-140
    4. Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang
      Pages 141-155
  4. Analysis

    1. Liqun Chen, Paul Morrissey, Nigel P. Smart
      Pages 156-175
    2. Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li
      Pages 176-184
    3. Tibor Jager, Jörg Schwenk
      Pages 200-209
  5. Application of Hash Functions

    1. Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta
      Pages 226-240
    2. Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin
      Pages 241-253
  6. Universal Composability

    1. Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto
      Pages 268-282
    2. Sebastian Gajek, Mark Manulis, Olivier Pereira, Ahmad-Reza Sadeghi, Jörg Schwenk
      Pages 313-327
  7. Applications

  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Second International Conference on Provable Security, ProvSec 2008, held in Shanghai, China, October 30 - November 1, 2008.

The 25 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, and Applications.

Keywords

Permutation Symbol calculus cryptanalysis damgard diffie-hellman merkle pgp pseudorandom public key signcryption symbolic analysis tls

Editors and affiliations

  • Joonsang Baek
    • 1
  • Feng Bao
    • 2
  • Kefei Chen
    • 3
  • Xuejia Lai
    • 3
  1. 1.Cryptography and Security Department Institute for Infocomm ResearchSingapore
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-88733-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-88732-4
  • Online ISBN 978-3-540-88733-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site