Skip to main content
  • Conference proceedings
  • © 2006

Security and Cryptography for Networks

5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4116)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SCN: International Conference on Security and Cryptography for Networks

Conference proceedings info: SCN 2006.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Distributed Systems Security: Foundations

    1. Edge Eavesdropping Games

      • Amos Beimel, Matthew Franklin
      Pages 1-17
    2. Universally Composable Simultaneous Broadcast

      • Alejandro Hevia
      Pages 18-33
  3. Signature Schemes Variants

    1. Relations Among Security Notions for Undeniable Signature Schemes

      • Kaoru Kurosawa, Swee-Huay Heng
      Pages 34-48
    2. Concurrent Blind Signatures Without Random Oracles

      • Aggelos Kiayias, Hong-Sheng Zhou
      Pages 49-62
    3. Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions

      • Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater
      Pages 63-77
  4. Block Ciphers Analysis

    1. Understanding Two-Round Differentials in AES

      • Joan Daemen, Vincent Rijmen
      Pages 78-94
    2. Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b

      • Jiqiang Lu, Changhoon Lee, Jongsung Kim
      Pages 95-110
  5. Anonymity and E-Commerce

    1. Constant-Size Dynamic k-TAA

      • Man Ho Au, Willy Susilo, Yi Mu
      Pages 111-125
    2. On Secure Orders in the Presence of Faults

      • Amir Herzberg, Igal Yoffe
      Pages 126-140
    3. Balancing Accountability and Privacy Using E-Cash (Extended Abstract)

      • Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
      Pages 141-155
  6. Public Key Encryption and Key Exchange

    1. About the Security of MTI/C0 and MQV

      • Sébastien Kunz-Jacques, David Pointcheval
      Pages 156-172
    2. A New Key Exchange Protocol Based on MQV Assuming Public Computations

      • Sébastien Kunz-Jacques, David Pointcheval
      Pages 186-200
  7. Secret Sharing

    1. Cheating Immune (2,n)-Threshold Visual Secret Sharing

      • Roberto De Prisco, Alfredo De Santis
      Pages 216-228
    2. Rational Secret Sharing, Revisited

      • S. Dov Gordon, Jonathan Katz
      Pages 229-241
  8. Symmetric Key Cryptanalysis and Randomness

    1. On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)

      • Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
      Pages 242-256
    2. Distinguishing Stream Ciphers with Convolutional Filters

      • Joan Daemen, Gilles Van Assche
      Pages 257-270
    3. On Statistical Testing of Random Numbers Generators

      • F. El Haje, Y. Golubev, P. -Y. Liardet, Y. Teglia
      Pages 271-287

Other Volumes

  1. Security and Cryptography for Networks

About this book

The Conference on Security and Cryptography for Networks 2006 (SCN 2006) was held in Maiori, Italy, on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year marked a change in its name (the former name was Security in Communication Networks). The name change meant to better describe the scope of the conference while preserving the SCN acronym. This year for the ?rst time we had the proceedings volume ready at the conference. We feel thatthe SCN conferencehas maturedandthat it has becomea tradition to hold it regularly in the beautiful setting of the Amal?tan coast as a biennial event. Theconferencebroughttogetherresearchersinthe?eldsofcryptographyand security in order to foster the extension of cooperation and exchange of ideas among them, aiming at assuring safety and trustworthiness of communication networks. The topics covered by the conference this year included: foundations of distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption and key exchange, secret sharing, symmetric and public key cryptanalysis, randomness, authentication. The international Program Committee consisted of 24 members who are top experts in the conference ?elds. We received 81 submissions amongst which 24 papers were selected for presentation at the conference. These proceedings - clude the extended abstract versions of the 24 accepted papers and the short abstract of the invited talk by Ivan Damg? ard.

Editors and Affiliations

  • Dipartimento di Informatica ed Applicazioni, Università di Salerno, Fisciano (SA), Italy

    Roberto Prisco

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access