The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to better describe the scope of the conference while preserving the SCN acronym. This year for the ?rst time we had the proceedings volume ready at the conference. We feel thatthe SCN conferencehas maturedandthat it has becomea tradition to hold it regularly in the beautiful setting of the Amal?tan coast as a biennial event. Theconferencebroughttogetherresearchersinthe?eldsofcryptographyand security in order to foster the extension of cooperation and exchange of ideas among them, aiming at assuring safety and trustworthiness of communication networks. The topics covered by the conference this year included: foundations of distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption and key exchange, secret sharing, symmetric and public key cryptanalysis, randomness, authentication. The international Program Committee consisted of 24 members who are top experts in the conference ?elds. We received 81 submissions amongst which 24 papers were selected for presentation at the conference. These proceedings - clude the extended abstract versions of the 24 accepted papers and the short abstract of the invited talk by Ivan Damg? ard.
Author(s): Amos Beimel, Matthew Franklin (auth.), Roberto De Prisco, Moti Yung (eds.)
Series: Lecture Notes in Computer Science 4116 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 368
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computers and Society
Front Matter....Pages -
Edge Eavesdropping Games....Pages 1-17
Universally Composable Simultaneous Broadcast....Pages 18-33
Relations Among Security Notions for Undeniable Signature Schemes....Pages 34-48
Concurrent Blind Signatures Without Random Oracles....Pages 49-62
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions....Pages 63-77
Understanding Two-Round Differentials in AES....Pages 78-94
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b....Pages 95-110
Constant-Size Dynamic k -TAA....Pages 111-125
On Secure Orders in the Presence of Faults....Pages 126-140
Balancing Accountability and Privacy Using E-Cash (Extended Abstract)....Pages 141-155
About the Security of MTI/C0 and MQV....Pages 156-172
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles....Pages 173-185
A New Key Exchange Protocol Based on MQV Assuming Public Computations....Pages 186-200
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants....Pages 201-215
Cheating Immune (2, n )-Threshold Visual Secret Sharing....Pages 216-228
Rational Secret Sharing, Revisited....Pages 229-241
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)....Pages 242-256
Distinguishing Stream Ciphers with Convolutional Filters....Pages 257-270
On Statistical Testing of Random Numbers Generators....Pages 271-287
Lightweight Email Signatures (Extended Abstract)....Pages 288-302
Shoehorning Security into the EPC Tag Standard....Pages 303-320
Proof-Carrying Proxy Certificates....Pages 321-335
Cryptanalysis of Rainbow....Pages 336-347
An Improved LPN Algorithm....Pages 348-359
Theory and Practice of Multiparty Computation....Pages 360-364
Back Matter....Pages -