Advertisement

Cryptology and Network Security

7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

  • Matthew K. Franklin
  • Lucas Chi Kwong Hui
  • Duncan S. Wong

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5339)

Table of contents

  1. Front Matter
  2. Cryptosystems

    1. Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
      Pages 1-17
    2. Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan
      Pages 18-30
    3. Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda
      Pages 31-48
    4. Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
      Pages 49-63
  3. Signatures

    1. Raylin Tso, Xun Yi, Xinyi Huang
      Pages 64-79
    2. Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu
      Pages 80-97
    3. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 108-119
  4. Identification, Authentication and Key Management

    1. Michel Abdalla, Malika Izabachène, David Pointcheval
      Pages 133-148
    2. Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 149-161
  5. Cryptographic Algorithms and Protocols

    1. Youming Qiao, Christophe Tartary
      Pages 162-177
    2. Tiancheng Lou, Christophe Tartary
      Pages 196-213
    3. Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Kato, Yoshitaka Morikawa
      Pages 226-239
  6. Stream Ciphers and Block Ciphers

    1. Mohammad Ali Orumiehchi, S. Fahimeh Mohebbipoor, Hossein Ghodosi
      Pages 240-251
    2. Jorge Nakahara Jr.
      Pages 252-267
  7. Cryptographic Foundations

    1. Shaojing Fu, Chao Li, Bing Sun
      Pages 278-284
    2. Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 285-303
  8. Applications and Implementations

    1. Bogdan Carbunar, Mahesh Tripunitara
      Pages 317-331
    2. Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru
      Pages 332-348
    3. Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger
      Pages 349-365
  9. Security in Ad Hoc Networks and Wireless Sensor Networks

    1. Eric K. Wang, Lucas C. K. Hui, S. M. Yiu
      Pages 366-377
    2. Atefeh Mashatan, Douglas R. Stinson
      Pages 378-394
  10. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008.

The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks.

Keywords

AES DoS attacks ad hoc networks anonymity authentication block ciphers cryptanalysis cryptographic protocols cryptography digital signature elliptic curve cryptography encryption group signatures network security security

Editors and affiliations

  • Matthew K. Franklin
    • 1
  • Lucas Chi Kwong Hui
    • 2
  • Duncan S. Wong
    • 3
  1. 1.Department of Computer ScienceUniversity of CaliforniaDavisUSA
  2. 2.Department of Computer ScienceThe University of Hong KongHong KongChina
  3. 3.Department of Computer ScienceCity University of Hong KongHong KongHong Kong

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-89641-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-89640-1
  • Online ISBN 978-3-540-89641-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site