Skip to main content
  • Conference proceedings
  • © 2008

Security and Cryptography for Networks

6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5229)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SCN: International Conference on Security and Cryptography for Networks

Conference proceedings info: SCN 2008.

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Invited Talk

  3. Session 1: Implementations

    1. CLL: A Cryptographic Link Layer for Local Area Networks

      • Yves Igor Jerschow, Christian Lochert, Björn Scheuermann, Martin Mauve
      Pages 21-38
  4. Session 2: Protocols I

    1. Privacy Preserving Data Mining within Anonymous Credential Systems

      • Aggelos Kiayias, Shouhuai Xu, Moti Yung
      Pages 57-76
    2. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function

      • Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 77-91
  5. Session 4: Encryption II

    1. General Certificateless Encryption and Timed-Release Encryption

      • Sherman S. M. Chow, Volker Roth, Eleanor G. Rieffel
      Pages 126-143
    2. Efficient Certificate-Based Encryption in the Standard Model

      • Joseph K. Liu, Jianying Zhou
      Pages 144-155
  6. Session 5: Primitives

    1. An Improved Robust Fuzzy Extractor

      • Bhavana Kanukurthi, Leonid Reyzin
      Pages 156-171
    2. On Linear Secret Sharing for Connectivity in Directed Graphs

      • Amos Beimel, Anat Paskin
      Pages 172-184
  7. Session 6: Signatures

    1. Expressive Subgroup Signatures

      • Xavier Boyen, Cécile Delerablée
      Pages 185-200
    2. Anonymous Proxy Signatures

      • Georg Fuchsbauer, David Pointcheval
      Pages 201-217
  8. Session 7: Hardware and Cryptanalysis

    1. Using Normal Bases for Compact Hardware Implementations of the AES S-Box

      • Svetla Nikova, Vincent Rijmen, Martin Schläffer
      Pages 236-245
    2. A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes

      • Marco Baldi, Marco Bodrato, Franco Chiaraluce
      Pages 246-262
    3. Full Cryptanalysis of LPS and Morgenstern Hash Functions

      • Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater
      Pages 263-277
    4. A New DPA Countermeasure Based on Permutation Tables

      • Jean-Sébastien Coron
      Pages 278-292

Other Volumes

  1. Security and Cryptography for Networks

About this book

This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.

Bibliographic Information

Buy it now

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access