Applied Cryptography and Network Security: 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.

The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.

Author(s): Mark Manulis (auth.), Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.)
Series: Lecture Notes in Computer Science 5536 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 535
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Information Systems Applications (incl.Internet); Coding and Information Theory; Data Structures, Cryptology and Information Theory

Front Matter....Pages -
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys....Pages 1-19
Session-state Reveal Is Stronger Than Ephemeral Key Reveal : Attacking the NAXOS Authenticated Key Exchange Protocol....Pages 20-33
Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior....Pages 34-52
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results....Pages 53-70
Novel Precomputation Schemes for Elliptic Curve Cryptosystems....Pages 71-88
Practical Secure Evaluation of Semi-private Functions....Pages 89-106
Secure Hamming Distance Based Computation and Its Applications....Pages 107-124
Efficient Robust Private Set Intersection....Pages 125-142
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack....Pages 143-155
An Efficient Identity-Based Online/Offline Encryption Scheme....Pages 156-167
Dual-Policy Attribute Based Encryption....Pages 168-185
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions....Pages 186-200
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis....Pages 201-218
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks....Pages 219-237
Breaking Two k -Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size....Pages 238-252
Tracing and Revoking Pirate Rebroadcasts....Pages 253-271
Efficient Deniable Authentication for Signatures....Pages 272-291
Homomorphic MACs: MAC-Based Integrity for Network Coding....Pages 292-305
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN....Pages 306-323
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks....Pages 324-341
Cryptanalysis of Twister....Pages 342-353
Cryptanalysis of CubeHash ....Pages 354-368
Collision Attack on Boole....Pages 369-381
Integrity Protection for Revision Control....Pages 382-399
Fragility of the Robust Security Network: 802.11 Denial of Service....Pages 400-416
Fast Packet Classification Using Condition Factorization....Pages 417-436
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches....Pages 437-455
Broadcast Attacks against Lattice-Based Cryptosystems....Pages 456-472
Partial Key Exposure Attack on CRT-RSA....Pages 473-484
How to Compare Profiled Side-Channel Attacks?....Pages 485-498
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis....Pages 499-518
Attacking ECDSA-Enabled RFID Devices....Pages 519-534
Back Matter....Pages -