Applied Cryptography and Network Security

8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings

  • Jianying Zhou
  • Moti Yung
Conference proceedings ACNS 2010
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6123)

Table of contents

  1. Front Matter
  2. Public Key Encryption

    1. Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
      Pages 1-18
    2. Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing
      Pages 19-34
  3. Digital Signature

    1. Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee
      Pages 53-68
    2. Markus Rückert, Michael Schneider, Dominique Schröoder
      Pages 69-86
    3. Christina Brzuska, Heike Busch, Oezguer Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser et al.
      Pages 87-104
  4. Block Ciphers and Hash Functions

    1. Baudoin Collard, Francois-Xavier Standaert
      Pages 123-138
    2. Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang
      Pages 139-153
    3. Nicolas Méloni, Christophe Négre, M. Anwar Hasan
      Pages 154-167
  5. Side-Channel Attacks

    1. Nicolas Veyrat-Charvillon, François-Xavier Standaert
      Pages 186-199
    2. Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
      Pages 200-217
  6. Zero Knowledge and Multi-party Protocols

    1. Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
      Pages 218-235
    2. Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
      Pages 255-272
    3. Aggelos Kiayias, Serdar Pehlivanoglu
      Pages 273-290
  7. Key Management

    1. Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 291-308
    2. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
      Pages 309-328

About these proceedings

Introduction

ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.

Keywords

AES RFID RSA algorithms authentication calculus complexity cryptanalysis cryptography hash function

Editors and affiliations

  • Jianying Zhou
    • 1
  • Moti Yung
    • 2
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-13708-2
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-13707-5
  • Online ISBN 978-3-642-13708-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book