Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 5536 : Security and Cryptology

ISBN: 3642019560, 9783642019562

Size: 9 MB (9214449 bytes)

Pages: 535/545

File format:

Language:

Publishing Year:

Category: Tags: , , , , , ,

Mark Manulis (auth.), Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.)3642019560, 9783642019562

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.

The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.


Table of contents :
Front Matter….Pages –
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys….Pages 1-19
Session-state Reveal Is Stronger Than Ephemeral Key Reveal : Attacking the NAXOS Authenticated Key Exchange Protocol….Pages 20-33
Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior….Pages 34-52
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results….Pages 53-70
Novel Precomputation Schemes for Elliptic Curve Cryptosystems….Pages 71-88
Practical Secure Evaluation of Semi-private Functions….Pages 89-106
Secure Hamming Distance Based Computation and Its Applications….Pages 107-124
Efficient Robust Private Set Intersection….Pages 125-142
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack….Pages 143-155
An Efficient Identity-Based Online/Offline Encryption Scheme….Pages 156-167
Dual-Policy Attribute Based Encryption….Pages 168-185
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions….Pages 186-200
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis….Pages 201-218
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks….Pages 219-237
Breaking Two k -Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size….Pages 238-252
Tracing and Revoking Pirate Rebroadcasts….Pages 253-271
Efficient Deniable Authentication for Signatures….Pages 272-291
Homomorphic MACs: MAC-Based Integrity for Network Coding….Pages 292-305
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN….Pages 306-323
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks….Pages 324-341
Cryptanalysis of Twister….Pages 342-353
Cryptanalysis of CubeHash ….Pages 354-368
Collision Attack on Boole….Pages 369-381
Integrity Protection for Revision Control….Pages 382-399
Fragility of the Robust Security Network: 802.11 Denial of Service….Pages 400-416
Fast Packet Classification Using Condition Factorization….Pages 417-436
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches….Pages 437-455
Broadcast Attacks against Lattice-Based Cryptosystems….Pages 456-472
Partial Key Exposure Attack on CRT-RSA….Pages 473-484
How to Compare Profiled Side-Channel Attacks?….Pages 485-498
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis….Pages 499-518
Attacking ECDSA-Enabled RFID Devices….Pages 519-534
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings”
Shopping Cart
Scroll to Top