default search action
7. SCN 2010: Amalfi, Italy
- Juan A. Garay, Roberto De Prisco:
Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6280, Springer 2010, ISBN 978-3-642-15316-7
Encryption I
- Kenneth G. Paterson, Elizabeth A. Quaglia:
Time-Specific Encryption. 1-16 - Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III:
Public-Key Encryption with Efficient Amortized Updates. 17-35 - Goichiro Hanaoka, Jian Weng:
Generic Constructions of Parallel Key-Insulated Encryption. 36-53
Invited Talk
- Chris Peikert:
Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk). 54
Cryptanalysis
- Jianyong Huang, Willy Susilo, Jennifer Seberry:
Differential Fault Analysis of LEX. 55-72 - Jiageng Chen, Atsuko Miyaji:
Generalized RC4 Key Collisions and Hash Collisions. 73-87
Hash Functions
- Elena Andreeva, Bart Mennink, Bart Preneel:
On the Indifferentiability of the Grøstl Hash Function. 88-105
Side Channel Attacks and Leakage Resilience
- Feng-Hao Liu, Anna Lysyanskaya:
Algorithmic Tamper-Proof Security under Probing Attacks. 106-120 - Francesco Davì, Stefan Dziembowski, Daniele Venturi:
Leakage-Resilient Storage. 121-137
Encryption II
- Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Searching Keywords with Wildcards on Encrypted Data. 138-153 - Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini:
Threshold Attribute-Based Signcryption. 154-171
Cryptographic Protocols I
- Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. 172-181 - Octavian Catrina, Sebastiaan de Hoogh:
Improved Primitives for Secure Multiparty Integer Computation. 182-199 - Stefan Dziembowski:
How to Pair with a Human. 200-218
Authentication and Key Agreement
- Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard:
A New Security Model for Authenticated Key Agreement. 219-234 - Vladimir Kolesnikov:
A Security Enhancement and Proof for Authentication and Key Agreement (AKA). 235-252 - Stanislaw Jarecki, Nitesh Saxena:
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. 253-270
Cryptographic Primitives and Schemes
- Adam L. Young, Moti Yung:
Kleptography from Standard Assumptions and Applications. 271-290 - Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. 291-308 - Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder, Peter Schröder, Daniel Wagner:
History-Free Aggregate Message Authentication Codes. 309-328
Lattice-Based Cryptography
- Thomas Plantard, Willy Susilo:
Recursive Lattice Reduction. 329-344 - Markus Rückert:
Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. 345-362
Groups Signatures and Authentication
- Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi:
The Fiat-Shamir Transform for Group and Ring Signature Schemes. 363-380 - Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, Bogdan Warinschi:
Get Shorty via Group Signatures without Encryption. 381-398 - Bartosz Przydatek, Douglas Wikström:
Group Message Authentication. 399-417
Cryptographic Protocols II
- Stanislaw Jarecki, Xiaomin Liu:
Fast Secure Computation of Set Intersection. 418-435 - Aniket Kate, Ian Goldberg:
Distributed Private-Key Generators for Identity-Based Cryptography. 436-453
Anonymity
- Jan Camenisch, Markulf Kohlweiss, Claudio Soriente:
Solving Revocation with Efficient Update of Anonymous Credentials. 454-471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.