网络用安全与密码术:SCN 2006/会议录Security and cryptography for networks.

分类: 图书,计算机/网络,信息安全,
作者: Roberto De Prisco 著
出 版 社: 湖北辞书出版社
出版时间: 2006-12-1字数:版次: 1页数: 364印刷时间: 2006/12/01开本:印次:纸张: 胶版纸I S B N : 9783540380801包装: 平装编辑推荐
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community, with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science resarch forum available.
The scope of LNCS, including its subseries LNAI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material publised traditionally includes.
-proceedings(published in time for the respective conference)
-post-proceedings(consisting of thoroughly revised final full papers)
-research monographs(which may be basde on outstanding PhD work, research projects, technical reports, etc.)
内容简介
This book constitutes the refereed proceedings of the 5th International Conference on Security and Cryptology for Networks, SCN 2006, held in Maiori, Italy in September 2006.
The 24 revised full papers presented together with the abstract of an invited talk were carefully revised and selected from 81 submissions. The papers are organized in topical sections on distributed systems security, signature schemes variants, block cipher analysis, anonymity and e-commerce, public key encryption and key exchange, secret sharing, symmetric key cryptanalisis and randomness, applied authentication, and public key related cryptanalisis.
目录
Distributed Systems Security: Foundations
Edge Eavesdropping Games
Universally Composable Simultaneous Broadcast
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes.
Concurrent Blind Signatures Without Random Oracles
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
Block Ciphers Analysis
Understanding Two-Round Differentials in AES
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA
On Secure Orders in the Presence of Faults
Balancing Accountability and Privacy Using E-Cash
Public Key Encryption and Key Exchange
About the Security of MTI/C0 and MQV
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants
Cheating Immune (2, n)-Threshold Visual Secret Sharing
Rational Secret Sharing, Revisited
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
Distinguishing Stream Ciphers with Convolutional Filters
On Statistical Testing of Random Numbers Generators
Applied Authentication
Lightweight Email Signatures
Shoehorning Security into the EPC Tag Standard
……
Public Key Related Cryptanalysis
Invited Talk
Author Index