


default search action
5. SCN 2006: Maiori, Italy
- Roberto De Prisco, Moti Yung:

Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings. Lecture Notes in Computer Science 4116, Springer 2006, ISBN 3-540-38080-9
Distributed Systems Security: Foundations
- Amos Beimel, Matthew K. Franklin:

Edge Eavesdropping Games. 1-17 - Alejandro Hevia

:
Universally Composable Simultaneous Broadcast. 18-33
Signature Schemes Variants
- Kaoru Kurosawa, Swee-Huay Heng:

Relations Among Security Notions for Undeniable Signature Schemes. 34-48 - Aggelos Kiayias, Hong-Sheng Zhou

:
Concurrent Blind Signatures Without Random Oracles. 49-62 - Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater:

Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. 63-77
Block Ciphers Analysis
- Joan Daemen, Vincent Rijmen:

Understanding Two-Round Differentials in AES. 78-94 - Jiqiang Lu, Changhoon Lee

, Jongsung Kim:
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. 95-110
Anonymity and E-Commerce
- Man Ho Au, Willy Susilo

, Yi Mu:
Constant-Size Dynamic k-TAA. 111-125 - Amir Herzberg

, Igal Yoffe:
On Secure Orders in the Presence of Faults. 126-140 - Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:

Balancing Accountability and Privacy Using E-Cash (Extended Abstract). 141-155
Public Key Encryption and Key Exchange
- Sébastien Kunz-Jacques, David Pointcheval

:
About the Security of MTI/C0 and MQV. 156-172 - David Galindo, Eike Kiltz

:
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. 173-185 - Sébastien Kunz-Jacques, David Pointcheval

:
A New Key Exchange Protocol Based on MQV Assuming Public Computations. 186-200
Secret Sharing
- Jaume Martí-Farré

, Carles Padró:
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. 201-215 - Roberto De Prisco

, Alfredo De Santis
:
Cheating Immune (2, n)-Threshold Visual Secret Sharing. 216-228 - S. Dov Gordon, Jonathan Katz:

Rational Secret Sharing, Revisited. 229-241
Symmetric Key Cryptanalysis and Randomness
- Jongsung Kim, Alex Biryukov

, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). 242-256 - Joan Daemen, Gilles Van Assche:

Distinguishing Stream Ciphers with Convolutional Filters. 257-270 - Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia:

On Statistical Testing of Random Numbers Generators. 271-287
Applied Authentication
- Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest:

Lightweight Email Signatures (Extended Abstract). 288-302 - Daniel V. Bailey, Ari Juels:

Shoehorning Security into the EPC Tag Standard. 303-320 - Walid Bagga, Stefano Crosta, Refik Molva:

Proof-Carrying Proxy Certificates. 321-335
Public Key Related Cryptanalysis
- Olivier Billet, Henri Gilbert:

Cryptanalysis of Rainbow. 336-347 - Éric Levieil, Pierre-Alain Fouque

:
An Improved LPN Algorithm. 348-359
Invited Talk
- Ivan Damgård:

Theory and Practice of Multiparty Computation. 360-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














