Applied Cryptography and Network Security

7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings

  • Michel Abdalla
  • David Pointcheval
  • Pierre-Alain Fouque
  • Damien Vergnaud
Conference proceedings ACNS 2009

DOI: 10.1007/978-3-642-01957-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5536)

Table of contents (32 papers)

  1. Front Matter
  2. Key Exchange

  3. Secure Computation

    1. Novel Precomputation Schemes for Elliptic Curve Cryptosystems
      Patrick Longa, Catherine Gebotys
      Pages 71-88
    2. Practical Secure Evaluation of Semi-private Functions
      Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 89-106
    3. Secure Hamming Distance Based Computation and Its Applications
      Ayman Jarrous, Benny Pinkas
      Pages 107-124
    4. Efficient Robust Private Set Intersection
      Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
      Pages 125-142
  4. Public-Key Encryption

    1. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
      Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
      Pages 143-155
    2. An Efficient Identity-Based Online/Offline Encryption Scheme
      Joseph K. Liu, Jianying Zhou
      Pages 156-167
    3. Dual-Policy Attribute Based Encryption
      Nuttapong Attrapadung, Hideki Imai
      Pages 168-185
  5. Network Security I

  6. Traitor Tracing

    1. Tracing and Revoking Pirate Rebroadcasts
      Aggelos Kiayias, Serdar Pehlivanoglu
      Pages 253-271
  7. Authentication and Anonymity

    1. Efficient Deniable Authentication for Signatures
      Jean Monnerat, Sylvain Pasini, Serge Vaudenay
      Pages 272-291
    2. Homomorphic MACs: MAC-Based Integrity for Network Coding
      Shweta Agrawal, Dan Boneh
      Pages 292-305
    3. Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
      Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo
      Pages 306-323

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.

The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.

Keywords

ad hoc networks ciphertext attack cryptanalysis cryptography denial of service elliptic curve cryptography hamming distance malware naxos network security p2p keys pervasive networks rsa secure pairing signature

Editors and affiliations

  • Michel Abdalla
    • 1
  • David Pointcheval
    • 1
  • Pierre-Alain Fouque
    • 1
  • Damien Vergnaud
    • 1
  1. 1.École Normale SupérieureParis Cedex 05France

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01956-2
  • Online ISBN 978-3-642-01957-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349