网络用安全与密码术:SCN 2006/会议录

网络用安全与密码术:SCN 2006/会议录
作 者: Roberto De Prisco
出版社: 崇文书局(原湖北辞书出版社)
丛编项:
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 暂缺
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《网络用安全与密码术:SCN 2006/会议录》作者简介

内容简介

This book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006.The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis.

图书目录

Distributed Systems Security: Foundations

 Edge Eavesdropping Games

 Universally Composable Simultaneous Broadcast

Signature Schemes Variants

 Relations Among Security Notions for Undeniable Signature Schemes.

 Concurrent Blind Signatures Without Random Oracles

 Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions

Block Ciphers Analysis

 Understanding Two-Round Differentials in AES

 Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.

 Anonymity and E-Commerce

 Constant-Size Dynamic k-TAA

 On Secure Orders in the Presence of Faults

 Balancing Accountability and Privacy Using E-Cash

Public Key Encryption and Key Exchange

 About the Security of MTI/C0 and MQV

 Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles

 A New Key Exchange Protocol Based on MQV Assuming Public Computations

Secret Sharing

 Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants

 Cheating Immune (2, n)-Threshold Visual Secret Sharing

 Rational Secret Sharing, Revisited

Symmetric Key Cryptanalysis and Randomness

 On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1

 Distinguishing Stream Ciphers with Convolutional Filters

 On Statistical Testing of Random Numbers Generators

Applied Authentication

 Lightweight Email Signatures

 Shoehorning Security into the EPC Tag Standard

……

Public Key Related Cryptanalysis

Invited Talk

Author Index