Cryptology and Network Security 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings /

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008. The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in top...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Franklin, Matthew. (Editor, http://id.loc.gov/vocabulary/relators/edt), Hui, Lucas Chi-Kwong. (Editor, http://id.loc.gov/vocabulary/relators/edt), Wong, Duncan S. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edition:1st ed. 2008.
Series:Security and Cryptology ; 5339
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-89641-8
Table of Contents:
  • Cryptosystems
  • Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
  • Hybrid Damgård Is CCA1-Secure under the DDH Assumption
  • Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption
  • Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
  • Signatures
  • Efficient and Short Certificateless Signature
  • Sanitizable Signatures Revisited
  • An Efficient On-Line/Off-Line Signature Scheme without Random Oracles
  • On the Security of Online/Offline Signatures and Multisignatures from ACISP’06
  • Identification, Authentication and Key Management
  • A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
  • Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
  • Cryptanalysis of EC-RAC, a RFID Identification Protocol
  • Cryptographic Algorithms and Protocols
  • Counting Method for Multi-party Computation over Non-abelian Groups
  • Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups
  • Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
  • Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols
  • Skew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based Cryptography
  • Stream Ciphers and Block Ciphers
  • Cryptanalysis of MV3 Stream Cipher
  • 3D: A Three-Dimensional Block Cipher
  • Cryptographic Foundations
  • Construction of Resilient Functions with Multiple Cryptographic Criteria
  • Enumeration of Homogeneous Rotation Symmetric Functions over F p
  • Unconditionally Reliable Message Transmission in Directed Hypergraphs
  • Applications and Implementations
  • An Open Framework for Remote Electronic Elections
  • Conditional Payments for Computing Markets
  • High-Speed Search System for PGP Passphrases
  • Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
  • Security in Ad Hoc Networks and Wireless Sensor Networks
  • Authenticated Directed Diffusion
  • A New Message Recognition Protocol for Ad Hoc Pervasive Networks.