This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.
The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
Author(s): Mark Manulis (auth.), Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.)
Series: Lecture Notes in Computer Science 5536 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009
Language: English
Pages: 535
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Information Systems Applications (incl.Internet); Coding and Information Theory; Data Structures, Cryptology and Information Theory
Front Matter....Pages -
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys....Pages 1-19
Session-state Reveal Is Stronger Than Ephemeral Key Reveal : Attacking the NAXOS Authenticated Key Exchange Protocol....Pages 20-33
Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior....Pages 34-52
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results....Pages 53-70
Novel Precomputation Schemes for Elliptic Curve Cryptosystems....Pages 71-88
Practical Secure Evaluation of Semi-private Functions....Pages 89-106
Secure Hamming Distance Based Computation and Its Applications....Pages 107-124
Efficient Robust Private Set Intersection....Pages 125-142
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack....Pages 143-155
An Efficient Identity-Based Online/Offline Encryption Scheme....Pages 156-167
Dual-Policy Attribute Based Encryption....Pages 168-185
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions....Pages 186-200
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis....Pages 201-218
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks....Pages 219-237
Breaking Two k -Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size....Pages 238-252
Tracing and Revoking Pirate Rebroadcasts....Pages 253-271
Efficient Deniable Authentication for Signatures....Pages 272-291
Homomorphic MACs: MAC-Based Integrity for Network Coding....Pages 292-305
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN....Pages 306-323
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks....Pages 324-341
Cryptanalysis of Twister....Pages 342-353
Cryptanalysis of CubeHash ....Pages 354-368
Collision Attack on Boole....Pages 369-381
Integrity Protection for Revision Control....Pages 382-399
Fragility of the Robust Security Network: 802.11 Denial of Service....Pages 400-416
Fast Packet Classification Using Condition Factorization....Pages 417-436
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches....Pages 437-455
Broadcast Attacks against Lattice-Based Cryptosystems....Pages 456-472
Partial Key Exposure Attack on CRT-RSA....Pages 473-484
How to Compare Profiled Side-Channel Attacks?....Pages 485-498
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis....Pages 499-518
Attacking ECDSA-Enabled RFID Devices....Pages 519-534
Back Matter....Pages -