Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings

著者

書誌事項

Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings

Roberto De Prisco, Moti Yung (eds.)

(Lecture notes in computer science, 4116)

Springer, c2006

大学図書館所蔵 件 / 15

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

Here are the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006. The book offers 24 revised full papers presented together with the abstract of an invited talk. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and more.

目次

Distributed Systems Security: Foundations.- Edge Eavesdropping Games.- Universally Composable Simultaneous Broadcast.- Signature Schemes Variants.- Relations Among Security Notions for Undeniable Signature Schemes.- Concurrent Blind Signatures Without Random Oracles.- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.- Block Ciphers Analysis.- Understanding Two-Round Differentials in AES.- Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.- Anonymity and E-Commerce.- Constant-Size Dynamic k-TAA.- On Secure Orders in the Presence of Faults.- Balancing Accountability and Privacy Using E-Cash (Extended Abstract).- Public Key Encryption and Key Exchange.- About the Security of MTI/C0 and MQV.- Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles.- A New Key Exchange Protocol Based on MQV Assuming Public Computations.- Secret Sharing.- Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants.- Cheating Immune (2,n)-Threshold Visual Secret Sharing.- Rational Secret Sharing, Revisited.- Symmetric Key Cryptanalysis and Randomness.- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).- Distinguishing Stream Ciphers with Convolutional Filters.- On Statistical Testing of Random Numbers Generators.- Applied Authentication.- Lightweight Email Signatures (Extended Abstract).- Shoehorning Security into the EPC Tag Standard.- Proof-Carrying Proxy Certificates.- Public Key Related Cryptanalysis.- Cryptanalysis of Rainbow.- An Improved LPN Algorithm.- Invited Talk.- Theory and Practice of Multiparty Computation.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

  • NII書誌ID(NCID)
    BA78287214
  • ISBN
    • 3540380809
  • LCCN
    2006931475
  • 出版国コード
    gw
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Berlin
  • ページ数/冊数
    xi, 364 p.
  • 大きさ
    24 cm
  • 分類
  • 親書誌ID
ページトップへ