default search action
5. SCN 2006: Maiori, Italy
- Roberto De Prisco, Moti Yung:
Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings. Lecture Notes in Computer Science 4116, Springer 2006, ISBN 3-540-38080-9
Distributed Systems Security: Foundations
- Amos Beimel, Matthew K. Franklin:
Edge Eavesdropping Games. 1-17 - Alejandro Hevia:
Universally Composable Simultaneous Broadcast. 18-33
Signature Schemes Variants
- Kaoru Kurosawa, Swee-Huay Heng:
Relations Among Security Notions for Undeniable Signature Schemes. 34-48 - Aggelos Kiayias, Hong-Sheng Zhou:
Concurrent Blind Signatures Without Random Oracles. 49-62 - Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater:
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. 63-77
Block Ciphers Analysis
- Joan Daemen, Vincent Rijmen:
Understanding Two-Round Differentials in AES. 78-94 - Jiqiang Lu, Changhoon Lee, Jongsung Kim:
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. 95-110
Anonymity and E-Commerce
- Man Ho Au, Willy Susilo, Yi Mu:
Constant-Size Dynamic k-TAA. 111-125 - Amir Herzberg, Igal Yoffe:
On Secure Orders in the Presence of Faults. 126-140 - Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). 141-155
Public Key Encryption and Key Exchange
- Sébastien Kunz-Jacques, David Pointcheval:
About the Security of MTI/C0 and MQV. 156-172 - David Galindo, Eike Kiltz:
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. 173-185 - Sébastien Kunz-Jacques, David Pointcheval:
A New Key Exchange Protocol Based on MQV Assuming Public Computations. 186-200
Secret Sharing
- Jaume Martí-Farré, Carles Padró:
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. 201-215 - Roberto De Prisco, Alfredo De Santis:
Cheating Immune (2, n)-Threshold Visual Secret Sharing. 216-228 - S. Dov Gordon, Jonathan Katz:
Rational Secret Sharing, Revisited. 229-241
Symmetric Key Cryptanalysis and Randomness
- Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). 242-256 - Joan Daemen, Gilles Van Assche:
Distinguishing Stream Ciphers with Convolutional Filters. 257-270 - Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia:
On Statistical Testing of Random Numbers Generators. 271-287
Applied Authentication
- Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest:
Lightweight Email Signatures (Extended Abstract). 288-302 - Daniel V. Bailey, Ari Juels:
Shoehorning Security into the EPC Tag Standard. 303-320 - Walid Bagga, Stefano Crosta, Refik Molva:
Proof-Carrying Proxy Certificates. 321-335
Public Key Related Cryptanalysis
- Olivier Billet, Henri Gilbert:
Cryptanalysis of Rainbow. 336-347 - Éric Levieil, Pierre-Alain Fouque:
An Improved LPN Algorithm. 348-359
Invited Talk
- Ivan Damgård:
Theory and Practice of Multiparty Computation. 360-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.