Springer, 2010. — 483 p. — ISBN: 9783642153174, 3642153178.
This book constitutes the proceedings of the 7th International Conference on Security and Cryptography for Networks held in Amalfi, Italy, in September 2010.
Time-Specific Encryption
Public-Key Encryption with Efficient Amortized Updates
Generic Constructions of Parallel Key-Insulated Encryption
Heuristics and Rigor in Lattice-Based Cryptography
Differential Fault Analysis of LEX
Generalized RC4 Key Collisions and Hash Collisions
On the Indifferentiability of the Grøstl Hash Function
Algorithmic Tamper-Proof Security under Probing Attacks
Leakage-Resilient Storage
Searching Keywords with Wildcards on Encrypted Data
Threshold Attribute-Based Signcryption
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption
Improved Primitives for Secure Multiparty Integer Computation
How to Pair with a Human
A New Security Model for Authenticated Key Agreement
A Security Enhancement and Proof for Authentication and Key Agreement (AKA)
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Kleptography from Standard Assumptions and Applications
Provably Secure Convertible Undeniable Signatures with Unambiguity
History-Free Aggregate Message Authentication Codes
Recursive Lattice Reduction
Adaptively Secure Identity-Based Identification from Lattices without Random Oracles
The Fiat–Shamir Transform for Group and Ring Signature Schemes
Get Shorty via Group Signatures without Encryption
Group Message Authentication
Fast Secure Computation of Set Intersection
Distributed Private-Key Generators for Identity-Based Cryptography
Solving Revocation with Efficient Update of Anonymous Credentials