This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability.Linear time erasure codes with nearly optimal recovery (extended abstract). In 36th Annual ... J. C. Fu and W. Y. W. Lou. Distribution ... Technical Report TR02- 024, Electronic Colloquium on Computational Complexity, April 2002. C. Karlof, N.
|Title||:||Cryptology and Network Security|
|Author||:||David Pointcheval, Yi Mu, Kefei Chen|
|Publisher||:||Springer - 2006-11-15|