Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Security and Cryptography for Networks

8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings

  • Conference proceedings
  • © 2012

Overview

Editors:
  1. Ivan Visconti
    1. Dipartimento di Informatica, Università di Salerno, Fisciano, Italy

    You can also search for this editor inPubMed Google Scholar

  2. Roberto Prisco
    1. Dipartimento di Informatica, Università di Salerno, Fisciano, Italy

    You can also search for this editor inPubMed Google Scholar

  • Up-to-date results
  • Fast-track conference proceedings
  • State-of-the-art research

Part of the book series:Lecture Notes in Computer Science (LNCS, volume 7485)

Part of the book sub series:Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: SCN 2012.

This is a preview of subscription content,log in via an institution to check access.

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access

About this book

This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.

The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.

Similar content being viewed by others

Keywords

Table of contents (31 papers)

  1. Cryptography from Lattices

    1. Ring Switching in BGV-Style Homomorphic Encryption

      • Craig Gentry, Shai Halevi, Chris Peikert, Nigel P. Smart
      Pages 19-37
    2. Fully Anonymous Attribute Tokens from Lattices

      • Jan Camenisch, Gregory Neven, Markus Rückert
      Pages 57-75
  2. Signature Schemes

    1. Efficient Structure-Preserving Signature Scheme from Standard Assumptions

      • Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev
      Pages 76-94
    2. Compact Round-Optimal Partially-Blind Signatures

      • Olivier Blazy, David Pointcheval, Damien Vergnaud
      Pages 95-112
    3. History-Free Sequential Aggregate Signatures

      • Marc Fischlin, Anja Lehmann, Dominique Schröder
      Pages 113-130
  3. Encryption Schemes I

    1. Decentralized Dynamic Broadcast Encryption

      • Duong Hieu Phan, David Pointcheval, Mario Strefler
      Pages 166-183
    2. Time-Specific Encryption from Forward-Secure Encryption

      • Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai
      Pages 184-204
  4. Efficient Two-Party and Multi-Party Computation

    1. 5PM: Secure Pattern Matching

      • Joshua Baron, Karim El Defrawy, Kirill Minkovich, Rafail Ostrovsky, Eric Tressler
      Pages 222-240
    2. Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol

      • Ivan Damgård, Marcel Keller, Enrique Larraia, Christian Miles, Nigel P. Smart
      Pages 241-263
  5. Security in the UC Framework

    1. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games

      • Seung Geol Choi, Dana Dachman-Soled, Moti Yung
      Pages 264-280
    2. Universally Composable Security with Local Adversaries

      • Ran Canetti, Margarita Vald
      Pages 281-301
  6. Cryptanalysis

    1. On the Strength Comparison of the ECDLP and the IFP

      • Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu
      Pages 302-325
    2. New Attacks for Knapsack Based Cryptosystems

      • Gottfried Herold, Alexander Meurer
      Pages 326-342
    3. Multiple Differential Cryptanalysis UsingLLR andχ2 Statistics

      • Céline Blondeau, Benoît Gérard, Kaisa Nyberg
      Pages 343-360

Other volumes

  1. Security and Cryptography for Networks

Editors and Affiliations

  • Dipartimento di Informatica, Università di Salerno, Fisciano, Italy

    Ivan Visconti, Roberto Prisco

Bibliographic Information

Publish with us

Back to top

Access this book

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Other ways to access


[8]ページ先頭

©2009-2025 Movatter.jp