Skip to main content
  • Conference proceedings
  • © 2006

Applied Cryptography and Network Security

4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3989)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACNS: International Conference on Applied Cryptography and Network Security

Conference proceedings info: ACNS 2006.

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-34704-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (33 papers)

  1. Front Matter

  2. Intrusion Avoidance and Detection

    1. Adaptive Detection of Local Scanners

      • Ahren Studer, Chenxi Wang
      Pages 1-17
    2. DSO: Dependable Signing Overlay

      • Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas Blough
      Pages 33-49
  3. Cryptographic Applications

    1. A Handy Multi-coupon System

      • Sébastien Canard, Aline Gouget, Emeline Hufschmitt
      Pages 66-81
    2. An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families

      • Dongvu Tonien, Reihaneh Safavi-Naini
      Pages 82-97
  4. DoS: Attacks and Countermeasures

    1. Efficient Memory Bound Puzzles Using Pattern Databases

      • Sujata Doshi, Fabian Monrose, Aviel D. Rubin
      Pages 98-113
    2. Effect of Malicious Synchronization

      • Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam
      Pages 114-129
    3. Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets

      • Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
      Pages 130-145
  5. Key Management

    1. Password Based Server Aided Key Exchange 

      • Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
      Pages 146-161
    2. Stateful Subset Cover

      • Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm
      Pages 178-193
  6. Cryptanalysis

    1. The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions

      • Khoongming Khoo, Guang Gong, Hian-Kiat Lee
      Pages 194-209
    2. Breaking a New Instance of TTM Cryptosystems

      • Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
      Pages 210-225
  7. Security of Limited Devices

    1. An AES Smart Card Implementation Resistant to Power Analysis Attacks

      • Christoph Herbst, Elisabeth Oswald, Stefan Mangard
      Pages 239-252
    2. Physical Security Bounds Against Tampering

      • Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
      Pages 253-267
    3. Flexible Exponentiation with Resistance to Side Channel Attacks

      • Camille Vuillaume, Katsuyuki Okeya
      Pages 268-283
  8. Cryptography

    1. An Improved Poly1305 MAC

      • Dayin Wang, Dongdai Lin, Wenling Wu
      Pages 284-292

Other Volumes

  1. Applied Cryptography and Network Security

    4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings

About this book

The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS 2006 brought together individuals from academia and industry involved in multiple research disciplines of cryptography and security to foster exchange of ideas. This volume (LNCS 3989) contains papers presented in the academic track. ACNS was set a high standard when it was initiated in 2003. There has been a steady improvement in the quality of its program in the past 4 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore). The average acc- tance rate is kept at around 16%. We wish to receive the continued support from the community of cryptographyand security worldwide to further improve its quality and make ACNS one of the leading conferences. The Program Committee of ACNS 2006 received a total of 218 submissions fromallovertheworld,ofwhich33wereselectedforpresentationattheacademic track. In addition to this track, the conference also hosted an industrial track of presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas. We are indebted to our Program Committee members and the external reviewers for the great job they have performed. The proceedings contain revised versions of the accepted papers. However, revisions were not checked and the authors bear full responsibility for the content of their papers.

Keywords

  • AES
  • DES
  • Denial of Service
  • Diffusion
  • PKI
  • authentication
  • cryptanalysis
  • cryptographic attacks
  • cryptography
  • database security
  • intrusion detection
  • network security
  • networks
  • privacy
  • public key cryptography

Editors and Affiliations

  • Cryptography and Security Department Institute for Infocomm Research, Singapore

    Jianying Zhou

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

  • Institute for Infocomm Research, Singapore

    Feng Bao

Bibliographic Information

Buying options

eBook USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-540-34704-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 129.99
Price excludes VAT (USA)