Advertisement

Applied Cryptography and Network Security

7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings

  • Michel Abdalla
  • David Pointcheval
  • Pierre-Alain Fouque
  • Damien Vergnaud

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5536)

Table of contents

  1. Front Matter
  2. Key Exchange

  3. Secure Computation

    1. Patrick Longa, Catherine Gebotys
      Pages 71-88
    2. Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 89-106
    3. Ayman Jarrous, Benny Pinkas
      Pages 107-124
    4. Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
      Pages 125-142
  4. Public-Key Encryption

    1. Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou
      Pages 143-155
    2. Joseph K. Liu, Jianying Zhou
      Pages 156-167
    3. Nuttapong Attrapadung, Hideki Imai
      Pages 168-185
  5. Network Security I

  6. Traitor Tracing

    1. Aggelos Kiayias, Serdar Pehlivanoglu
      Pages 253-271
  7. Authentication and Anonymity

    1. Jean Monnerat, Sylvain Pasini, Serge Vaudenay
      Pages 272-291
    2. Shweta Agrawal, Dan Boneh
      Pages 292-305
    3. Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo
      Pages 306-323
    4. Jörg Lenhard, Karsten Loesing, Guido Wirtz
      Pages 324-341
  8. Hash Functions

    1. Florian Mendel, Christian Rechberger, Martin Schläffer
      Pages 342-353
    2. Eric Brier, Thomas Peyrin
      Pages 354-368
    3. Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 369-381
  9. Network Security II

    1. Christian Cachin, Martin Geisler
      Pages 382-399
    2. Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
      Pages 417-436
  10. Lattices

    1. Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte
      Pages 437-455
    2. Thomas Plantard, Willy Susilo
      Pages 456-472
    3. Santanu Sarkar, Subhamoy Maitra
      Pages 473-484
  11. Side-Channel Attacks

    1. François-Xavier Standaert, François Koeune, Werner Schindler
      Pages 485-498
    2. Michael Hutter, Marcel Medwed, Daniel Hein, Johannes Wolkerstorfer
      Pages 519-534
  12. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.

The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.

Keywords

ad hoc networks ciphertext attack cryptanalysis cryptography denial of service elliptic curve cryptography hamming distance malware naxos network security p2p keys pervasive networks rsa secure pairing signature

Editors and affiliations

  • Michel Abdalla
    • 1
  • David Pointcheval
    • 1
  • Pierre-Alain Fouque
    • 1
  • Damien Vergnaud
    • 1
  1. 1.École Normale SupérieureParis Cedex 05France

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-01957-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-01956-2
  • Online ISBN 978-3-642-01957-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site