Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who assisted with reviewing and the CANS Steering Committee for their help. We thank Shai Halevi for use of his Web-Submission-and-Review software that was used for the electronic s- mission and review of the submitted papers, and we thank the International Association for Cryptologic Research (IACR) for Web hosting of the software.

Author(s): Asli Bay, Jorge Nakahara Jr., Serge Vaudenay (auth.), Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.)
Series: Lecture Notes in Computer Science 6467 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 355
Tags: Data Encryption; Computer Communication Networks; Discrete Mathematics in Computer Science; Coding and Information Theory; Data Structures, Cryptology and Information Theory; Symbolic and Algebraic Manipulation

Front Matter....Pages -
Cryptanalysis of Reduced-Round MIBS Block Cipher....Pages 1-19
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds....Pages 20-30
An Algorithm Based Concurrent Error Detection Scheme for AES....Pages 31-42
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)....Pages 43-43
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices....Pages 44-61
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP....Pages 62-75
User Tracking Based on Behavioral Fingerprints....Pages 76-95
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions....Pages 96-105
Integral Distinguishers of Some SHA-3 Candidates....Pages 106-123
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE....Pages 124-139
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems....Pages 140-155
Generating Parameters for Algebraic Torus-Based Cryptosystems....Pages 156-168
Analysis of the MQQ Public Key Cryptosystem....Pages 169-183
Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations....Pages 184-198
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk)....Pages 199-200
Towards a Cryptographic Treatment of Publish/Subscribe Systems....Pages 201-220
STE3D-CAP: Stereoscopic 3D CAPTCHA....Pages 221-240
TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism....Pages 241-260
Dynamic Group Key Exchange Revisited....Pages 261-277
Towards Practical and Secure Coercion-Resistant Electronic Elections....Pages 278-297
Predicate Encryption with Partial Public Keys....Pages 298-313
Anonymous Credential Schemes with Encrypted Attributes....Pages 314-333
One Time Anonymous Certificate: X.509 Supporting Anonymity....Pages 334-353
Back Matter....Pages -