


default search action
7. SCN 2010: Amalfi, Italy
- Juan A. Garay, Roberto De Prisco:

Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6280, Springer 2010, ISBN 978-3-642-15316-7
Encryption I
- Kenneth G. Paterson, Elizabeth A. Quaglia

:
Time-Specific Encryption. 1-16 - Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III:

Public-Key Encryption with Efficient Amortized Updates. 17-35 - Goichiro Hanaoka, Jian Weng

:
Generic Constructions of Parallel Key-Insulated Encryption. 36-53
Invited Talk
- Chris Peikert:

Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk). 54
Cryptanalysis
- Jianyong Huang, Willy Susilo

, Jennifer Seberry:
Differential Fault Analysis of LEX. 55-72 - Jiageng Chen

, Atsuko Miyaji
:
Generalized RC4 Key Collisions and Hash Collisions. 73-87
Hash Functions
- Elena Andreeva

, Bart Mennink, Bart Preneel
:
On the Indifferentiability of the Grøstl Hash Function. 88-105
Side Channel Attacks and Leakage Resilience
- Feng-Hao Liu, Anna Lysyanskaya:

Algorithmic Tamper-Proof Security under Probing Attacks. 106-120 - Francesco Davì, Stefan Dziembowski, Daniele Venturi

:
Leakage-Resilient Storage. 121-137
Encryption II
- Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel

, Willem Jonker:
Searching Keywords with Wildcards on Encrypted Data. 138-153 - Martin Gagné, Shivaramakrishnan Narayan, Reihaneh Safavi-Naini:

Threshold Attribute-Based Signcryption. 154-171
Cryptographic Protocols I
- Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:

Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. 172-181 - Octavian Catrina

, Sebastiaan de Hoogh:
Improved Primitives for Secure Multiparty Integer Computation. 182-199 - Stefan Dziembowski:

How to Pair with a Human. 200-218
Authentication and Key Agreement
- Augustin P. Sarr, Philippe Elbaz-Vincent, Jean-Claude Bajard

:
A New Security Model for Authenticated Key Agreement. 219-234 - Vladimir Kolesnikov:

A Security Enhancement and Proof for Authentication and Key Agreement (AKA). 235-252 - Stanislaw Jarecki, Nitesh Saxena:

Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. 253-270
Cryptographic Primitives and Schemes
- Adam L. Young, Moti Yung:

Kleptography from Standard Assumptions and Applications. 271-290 - Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata

:
Provably Secure Convertible Undeniable Signatures with Unambiguity. 291-308 - Oliver Eikemeier, Marc Fischlin, Jens-Fabian Götzmann, Anja Lehmann, Dominique Schröder

, Peter Schröder, Daniel Wagner:
History-Free Aggregate Message Authentication Codes. 309-328
Lattice-Based Cryptography
- Thomas Plantard

, Willy Susilo
:
Recursive Lattice Reduction. 329-344 - Markus Rückert:

Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. 345-362
Groups Signatures and Authentication
- Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi:

The Fiat-Shamir Transform for Group and Ring Signature Schemes. 363-380 - Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel P. Smart, Bogdan Warinschi:

Get Shorty via Group Signatures without Encryption. 381-398 - Bartosz Przydatek, Douglas Wikström:

Group Message Authentication. 399-417
Cryptographic Protocols II
- Stanislaw Jarecki, Xiaomin Liu:

Fast Secure Computation of Set Intersection. 418-435 - Aniket Kate, Ian Goldberg:

Distributed Private-Key Generators for Identity-Based Cryptography. 436-453
Anonymity
- Jan Camenisch, Markulf Kohlweiss

, Claudio Soriente
:
Solving Revocation with Efficient Update of Anonymous Credentials. 454-471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














