default search action
6. SCN 2008: Amalfi, Italy
- Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti:
Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings. Lecture Notes in Computer Science 5229, Springer 2008, ISBN 978-3-540-85854-6
Invited Talk
- Shai Halevi:
Storage Encryption: A Cryptographer's View. 1
Implementations
- Yehuda Lindell, Benny Pinkas, Nigel P. Smart:
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. 2-20 - Yves Igor Jerschow, Christian Lochert, Björn Scheuermann, Martin Mauve:
CLL: A Cryptographic Link Layer for Local Area Networks. 21-38 - Bodo Möller, Andy Rupp:
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. 39-56
Protocols I
- Aggelos Kiayias, Shouhuai Xu, Moti Yung:
Privacy Preserving Data Mining within Anonymous Credential Systems. 57-76 - Julien Bringer, Hervé Chabanne, Thomas Icart:
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. 77-91
Encryption I
- Guilhem Castagnos:
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. 92-108 - Isamu Teranishi, Wakaha Ogata:
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. 109-125
Encryption II
- Sherman S. M. Chow, Volker Roth, Eleanor Gilbert Rieffel:
General Certificateless Encryption and Timed-Release Encryption. 126-143 - Joseph K. Liu, Jianying Zhou:
Efficient Certificate-Based Encryption in the Standard Model. 144-155
Primitives
- Bhavana Kanukurthi, Leonid Reyzin:
An Improved Robust Fuzzy Extractor. 156-171 - Amos Beimel, Anat Paskin:
On Linear Secret Sharing for Connectivity in Directed Graphs. 172-184
Signatures
- Xavier Boyen, Cécile Delerablée:
Expressive Subgroup Signatures. 185-200 - Georg Fuchsbauer, David Pointcheval:
Anonymous Proxy Signatures. 201-217 - Ali Bagherzandi, Stanislaw Jarecki:
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. 218-235
Hardware and Cryptanalysis
- Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. 236-245 - Marco Baldi, Marco Bodrato, Franco Chiaraluce:
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. 246-262 - Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Functions. 263-277 - Jean-Sébastien Coron:
A New DPA Countermeasure Based on Permutation Tables. 278-292
Protocols II
- Douglas Wikström:
Simplified Submission of Inputs to Protocols. 293-308 - Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. 309-326
Encryption III
- Benoît Chevallier-Mames, David Naccache, Jacques Stern:
Linear Bandwidth Naccache-Stern Encryption. 327-339 - Kenneth G. Paterson, Gaven J. Watson:
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. 340-357 - Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou:
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). 358-374
Key Exchange
- Malika Izabachène, David Pointcheval:
New Anonymity Notions for Identity-Based Encryption. 375-391 - Jun Furukawa, Frederik Armknecht, Kaoru Kurosawa:
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. 392-408 - Christian Schridde, Matthew Smith, Bernd Freisleben:
An Identity-Based Key Agreement Protocol for the Network Layer. 409-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.