Skip to main content
  • Conference proceedings
  • © 2010

Security and Cryptography for Networks

7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings

  • up-to-date results
  • fast track conference proceedings
  • state-of-the-art report

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6280)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): SCN: International Conference on Security and Cryptography for Networks

Conference proceedings info: SCN 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Encryption I

    1. Time-Specific Encryption

      • Kenneth G. Paterson, Elizabeth A. Quaglia
      Pages 1-16
    2. Public-Key Encryption with Efficient Amortized Updates

      • Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III
      Pages 17-35
    3. Generic Constructions of Parallel Key-Insulated Encryption

      • Goichiro Hanaoka, Jian Weng
      Pages 36-53
  3. Invited Talk

  4. Cryptanalysis

    1. Differential Fault Analysis of LEX

      • Jianyong Huang, Willy Susilo, Jennifer Seberry
      Pages 55-72
    2. Generalized RC4 Key Collisions and Hash Collisions

      • Jiageng Chen, Atsuko Miyaji
      Pages 73-87
  5. Hash Functions

    1. On the Indifferentiability of the Grøstl Hash Function

      • Elena Andreeva, Bart Mennink, Bart Preneel
      Pages 88-105
  6. Side Channel Attacks and Leakage Resilience

    1. Algorithmic Tamper-Proof Security under Probing Attacks

      • Feng-Hao Liu, Anna Lysyanskaya
      Pages 106-120
    2. Leakage-Resilient Storage

      • Francesco Davì, Stefan Dziembowski, Daniele Venturi
      Pages 121-137
  7. Encryption II

    1. Searching Keywords with Wildcards on Encrypted Data

      • Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter Hartel, Willem Jonker
      Pages 138-153
    2. Threshold Attribute-Based Signcryption

      • Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini
      Pages 154-171
  8. Cryptographic Protocols I

    1. Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption

      • Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
      Pages 172-181
    2. Improved Primitives for Secure Multiparty Integer Computation

      • Octavian Catrina, Sebastiaan de Hoogh
      Pages 182-199
    3. How to Pair with a Human

      • Stefan Dziembowski
      Pages 200-218
  9. Authentication and Key Agreement

    1. A New Security Model for Authenticated Key Agreement

      • Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard
      Pages 219-234
  10. Cryptographic Primitives and Schemes

    1. Kleptography from Standard Assumptions and Applications

      • Adam Young, Moti Yung
      Pages 271-290
    2. Provably Secure Convertible Undeniable Signatures with Unambiguity

      • Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
      Pages 291-308

Other Volumes

  1. Security and Cryptography for Networks

Editors and Affiliations

  • AT&T Labs Research, Florham Park, USA

    Juan A. Garay

  • Dipartimento di Informatica ed Applicazioni, Università di Salerno, Fisciano, Italy

    Roberto Prisco

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access