did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642153167

Security and Cryptography for Networks : 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010, Proceedings

by ;
  • ISBN13:

    9783642153167

  • ISBN10:

    364215316X

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-11-04
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $109.00

Summary

This book constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks held in Amalfi, Italy, in September 2010.

Table of Contents

Time-Specific Encryptionp. 1
Public-Key Encryption with Efficient Amortized Updatesp. 17
Generic Constructions of Parallel Key-Insulated Encryptionp. 36
Invited Talk
Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)p. 54
Cryptanalysis
Differential Fault Analysis of LEXp. 55
Generalized RC4 Key Collisions and Hash Collisionsp. 73
Hash Functions
On the Indifferentiability of the Grøstl Hash Functionp. 88
Side Channel Attacks and Leakage Resilience
Algorithmic Tamper-Proof Security under Probing Attacksp. 106
Leakage-Resilient Storagep. 121
Searching Keywords with Wildcards on Encrypted Datap. 138
Threshold Attribute-Based Signcryptionp. 154
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumptionp. 172
Improved Primitives for Secure Multiparty Integer Computationp. 182
How to Pair with a Humanp. 200
Authentication and Key Agreement
A New Security Model for Authenticated Key Agreementp. 219
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)p. 235
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Modelp. 253
Cryptographic Primitives and Schemes
Kleptography from Standard Assumptions and Applicationsp. 271
Provably Secure Convertible Undeniable Signatures with Unarnbiguityp. 291
History-Free Aggregate Message Authentication Codesp. 309
Lattice-Based Cryptography
Recursive Lattice Reductionp. 329
Adaptively Secure Identity-Based Identification from Lattices without Random Oraclesp. 345
Groups Signatures and Authentication
The Fiat-Shamir Transform for Group and Ring Signature Schemesp. 363
Get Shorty via Group Signatures without Encryptionp. 381
Group Message Authenticationp. 399
Fast Secure Computation of Set Intersectionp. 418
Distributed Private-Key Generators for Identity-Based Cryptographyp. 436
Anonymity
Solving Revocation with Efficient Update of Anonymous Credentialsp. 454
Author Indexp. 473
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program