Applied Cryptography and Network Security

10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings

  • Feng Bao
  • Pierangela Samarati
  • Jianying Zhou
Conference proceedings ACNS 2012

DOI: 10.1007/978-3-642-31284-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7341)

Table of contents (33 papers)

  1. Front Matter
  2. Authentication

    1. Breaking an Animated CAPTCHA Scheme
      Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 12-29
    2. Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens
      Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung
      Pages 30-47
  3. Key Management

    1. RIKE: Using Revocable Identities to Support Key Escrow in PKIs
      Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao
      Pages 48-65
    2. TreVisor
      Tilo Müller, Benjamin Taubmann, Felix C. Freiling
      Pages 66-83
  4. Block Ciphers

  5. Identity-Based Cryptography

    1. Security Enhancements by OR-Proof in Identity-Based Identification
      Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 135-152
    2. Identity-Based Extractable Hash Proofs and Their Applications
      Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
      Pages 153-170
  6. Cryptographic Primitives

    1. On Structural Signatures for Tree Data Structures
      Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
      Pages 171-187
    2. Inner-Product Lossy Trapdoor Functions and Applications
      Xiang Xie, Rui Xue, Rui Zhang
      Pages 188-205
  7. Cryptanalysis

    1. Linear Fault Analysis of Block Ciphers
      Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li
      Pages 241-256
    2. Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys
      Yuki Asano, Shingo Yanagihara, Tetsu Iwata
      Pages 257-274
  8. Side Channel Attacks

    1. Zero-Value Point Attacks on Kummer-Based Cryptosystem
      Fangguo Zhang, Qiping Lin, Shengli Liu
      Pages 293-310
    2. PICARO – A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
      Gilles Piret, Thomas Roche, Claude Carlet
      Pages 311-328

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012.

The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

Keywords

authentication cloud computing data structures protocols spam detection

Editors and affiliations

  • Feng Bao
    • 1
  • Pierangela Samarati
    • 2
  • Jianying Zhou
    • 1
  1. 1.Institute for Infocomm ResearchSingaporeSingapore
  2. 2.Dipartimento di Tecnologie dell’ InformazioneUniversità degli Studi di MilanoCrema (CR)Italy

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31283-0
  • Online ISBN 978-3-642-31284-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349