Cover image for Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
Title:
Security and cryptography for networks : 5th international conference, SCN 2006, Maiori, Italy, September 6-8, 2006 : proceedings
Series:
Lecture notes in computer science ; 4116
Publication Information:
Berlin : Springer, 2006
ISBN:
9783540380801

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010128547 TK5105.59 S42 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to better describe the scope of the conference while preserving the SCN acronym. This year for the ?rst time we had the proceedings volume ready at the conference. We feel thatthe SCN conferencehas maturedandthat it has becomea tradition to hold it regularly in the beautiful setting of the Amal?tan coast as a biennial event. Theconferencebroughttogetherresearchersinthe?eldsofcryptographyand security in order to foster the extension of cooperation and exchange of ideas among them, aiming at assuring safety and trustworthiness of communication networks. The topics covered by the conference this year included: foundations of distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption and key exchange, secret sharing, symmetric and public key cryptanalysis, randomness, authentication. The international Program Committee consisted of 24 members who are top experts in the conference ?elds. We received 81 submissions amongst which 24 papers were selected for presentation at the conference. These proceedings - clude the extended abstract versions of the 24 accepted papers and the short abstract of the invited talk by Ivan Damg? ard.


Table of Contents

Amos Beimel and Matthew FranklinAlejandro HeviaKaoru Kurosawa and Swee-Huay HengAggelos Kiayias and Hong-Sheng ZhouFabien Laguillaumie and Benoit Libert and Jean-Jacques QuisquaterJoan Daemen and Vincent RijmenJiqiang Lu and Changhoon Lee and Jongsung KimMan Ho Au and Willy Susilo and Yi MuAmir Herzberg and Igal YoffeJan Camenisch and Susan Hohenberger and Anna LysyanskayaSebastien Kunz-Jacques and David PointchevalDavid Galindo and Eike KiltzSebastien Kunz-Jacques and David PointchevalJaume Marti-Farre and Carles PadroRoberto Be Prisco and Alfredo De SantisS. Dov Gordon and Jonathan KatzJongsung Kim and Alex Biryukov and Bart Preneel and Seokhie HongJoan Daemen and Gilles Van AsscheFida El Haje and Yuri Golubev and Pierre-Yvan Liardet and Yannick TegliaBen Adida and David Chau and Susan Hohenberger and Ronald L. RivestDaniel V. Bailey and Art JuelsWalid Bagga and Stefano Crosta and Refik MolvaOlivier Billet and Henri GilbertEric Levieil and Pierre-Alain FouqueIvan Damgard
Distributed Systems Security: Foundations
Edge Eavesdropping Gamesp. 1
Universally Composable Simultaneous Broadcastp. 18
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemesp. 34
Concurrent Blind Signatures Without Random Oraclesp. 49
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptionsp. 63
Block Ciphers Analysis
Understanding Two-Round Differentials in AESp. 78
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64bp. 95
Anonymity and E-Commerce
Constant-Size Dynamic k-TAAp. 111
On Secure Orders in the Presence of Faultsp. 126
Balancing Accountability and Privacy Using E-Cashp. 141
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQVp. 156
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oraclesp. 173
A New Key Exchange Protocol Based on MQV Assuming Public Computationsp. 186
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participantsp. 201
Cheating Immune (2, n)-Threshold Visual Secret Sharingp. 216
Rational Secret Sharing, Revisitedp. 229
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1p. 242
Distinguishing Stream Ciphers with Convolutional Filtersp. 257
On Statistical Testing of Random Numbers Generatorsp. 271
Applied Authentication
Lightweight Email Signaturesp. 288
Shoehorning Security into the EPC Tag Standardp. 303
Proof-Carrying Proxy Certificatesp. 321
Public Key Related Cryptanalysis
Cryptanalysis of Rainbowp. 336
An Improved LPN Algorithmp. 348
Invited Talk
Theory and Practice of Multiparty Computationp. 360
Author Indexp. 365