Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings

  • David Pointcheval
  • Yi Mu
  • Kefei Chen
Conference proceedings CANS 2006

DOI: 10.1007/11935070

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4301)

Table of contents (26 papers)

  1. Front Matter
  2. Encryption

    1. Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems
      Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
      Pages 1-18
    2. Efficient Identity-Based Encryption with Tight Security Reduction
      Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
      Pages 19-36
  3. Key Exchange

    1. A Diffie-Hellman Key Exchange Protocol Without Random Oracles
      Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
      Pages 37-54
    2. Authenticated Group Key Agreement for Multicast
      Liming Wang, Chuan-Kun Wu
      Pages 55-72
  4. Authentication and Signatures

  5. Proxy Signatures

    1. Security Model of Proxy-Multi Signature Schemes
      Feng Cao, Zhenfu Cao
      Pages 144-152
    2. Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque
      Rongxing Lu, Zhenfu Cao, Xiaolei Dong
      Pages 153-167
  6. Cryptanalysis

    1. Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
      Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
      Pages 168-181
    2. Improved Collision Attack on Reduced Round Camellia
      Guan Jie, Zhang Zhongya
      Pages 182-190
    3. Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks
      Zbigniew Gołȩbiewski, Mirosław Kutyłowski, Filip Zagórski
      Pages 191-202
  7. Implementation

    1. Bitslice Implementation of AES
      Chester Rebeiro, David Selvakumar, A. S. L. Devi
      Pages 203-212
  8. Steganalysis and Watermarking

    1. Steganalysis Based on Differential Statistics
      Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan
      Pages 224-240
    2. Watermarking Essential Data Structures for Copyright Protection
      Qutaiba Albluwi, Ibrahim Kamel
      Pages 241-258
  9. Boolean Functions and Stream Ciphers

    1. A Note of Perfect Nonlinear Functions
      Xiyong Zhang, Hua Guo, Jinjiang Yuan
      Pages 259-269
    2. Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing
      Xiaomin Wang, Jiashu Zhang, Wenfang Zhang
      Pages 270-285

About these proceedings


AES DDos attacks Distributed Denial of Service algorithm algorithms authentication communication cryotanalysis cryptographics cryptology encryption information hiding networks security trust

Editors and affiliations

  • David Pointcheval
    • 1
  • Yi Mu
    • 2
  • Kefei Chen
    • 3
  1. 1.Ecole Normale Supérieure – LIENS/CNRS/INRIA,France
  2. 2.Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia
  3. 3.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-49462-1
  • Online ISBN 978-3-540-49463-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349