Cryptology and Network Security

8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings

  • Juan A. Garay
  • Atsuko Miyaji
  • Akira Otsuka
Conference proceedings CANS 2009

DOI: 10.1007/978-3-642-10433-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5888)

Table of contents (35 papers)

  1. Front Matter
  2. Cryptographic Protocol and Schemes I

    1. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
      Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 1-20
    2. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
      G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 21-40
  3. Invited Talk 1

  4. Cryptanalysis I

    1. Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
      Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang
      Pages 58-75
    2. Saturation Attack on the Block Cipher HIGHT
      Peng Zhang, Bing Sun, Chao Li
      Pages 76-86
    3. Extensions of the Cube Attack Based on Low Degree Annihilators
      Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk
      Pages 87-102
    4. An Analysis of the Compact XSL Attack on BES and Embedded SMS4
      Jiali Choy, Huihui Yap, Khoongming Khoo
      Pages 103-118
  5. Wireless and Sensor Network Security I

    1. Anonymizer-Enabled Security and Privacy for RFID
      Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
      Pages 134-153
  6. Network Security

    1. DepenDNS: Dependable Mechanism against DNS Cache Poisoning
      Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin
      Pages 174-188
  7. Privacy and Anonymity

    1. Privacy-Preserving Relationship Path Discovery in Social Networks
      Ghita Mezzour, Adrian Perrig, Virgil Gligor, Panos Papadimitratos
      Pages 189-208
    2. Verifying Anonymous Credential Systems in Applied Pi Calculus
      Xiangxi Li, Yu Zhang, Yuxin Deng
      Pages 209-225
    3. Transferable Constant-Size Fair E-Cash
      Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
      Pages 226-247
  8. Functional and Searchable Encryption

    1. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle
      Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang
      Pages 248-258
    2. Private-Key Hidden Vector Encryption with Key Confidentiality
      Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
      Pages 259-277
  9. Invited Talk 2

  10. Authentication

About these proceedings


This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009.

The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.


Code Information MQQ cryptosystem RFID privacy RFID security authentication calculus complexity cryptanalysis cryptography e-cash network security sensor networks tate p wireless networks

Editors and affiliations

  • Juan A. Garay
    • 1
  • Atsuko Miyaji
    • 2
  • Akira Otsuka
    • 3
  1. 1.AT&T Labs ResearchNJUSA
  2. 2.Japan Advanced Institute of Science and Technology (JAIST)NomiJapan
  3. 3.National Institute of Advanced Industrial Science and Technoloy (AIST)TokyoJapan

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-10432-9
  • Online ISBN 978-3-642-10433-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349