This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008.
The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
Author(s): Shai Halevi (auth.), Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti (eds.)
Series: Lecture Notes in Computer Science 5229 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008
Language: English
Pages: 423
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computers and Society
Front Matter....Pages -
Storage Encryption: A Cryptographer’s View....Pages 1-1
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries....Pages 2-20
CLL: A Cryptographic Link Layer for Local Area Networks....Pages 21-38
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification....Pages 39-56
Privacy Preserving Data Mining within Anonymous Credential Systems....Pages 57-76
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function....Pages 77-91
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications....Pages 92-108
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption....Pages 109-125
General Certificateless Encryption and Timed-Release Encryption....Pages 126-143
Efficient Certificate-Based Encryption in the Standard Model....Pages 144-155
An Improved Robust Fuzzy Extractor....Pages 156-171
On Linear Secret Sharing for Connectivity in Directed Graphs....Pages 172-184
Expressive Subgroup Signatures....Pages 185-200
Anonymous Proxy Signatures....Pages 201-217
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem....Pages 218-235
Using Normal Bases for Compact Hardware Implementations of the AES S-Box....Pages 236-245
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes....Pages 246-262
Full Cryptanalysis of LPS and Morgenstern Hash Functions....Pages 263-277
A New DPA Countermeasure Based on Permutation Tables....Pages 278-292
Simplified Submission of Inputs to Protocols....Pages 293-308
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited....Pages 309-326
Linear Bandwidth Naccache-Stern Encryption....Pages 327-339
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment....Pages 340-357
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)....Pages 358-374
New Anonymity Notions for Identity-Based Encryption....Pages 375-391
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort....Pages 392-408
An Identity-Based Key Agreement Protocol for the Network Layer....Pages 409-422
Back Matter....Pages -