Advertisement

Cryptology and Network Security

9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings

  • Swee-Huay Heng
  • Rebecca N. Wright
  • Bok-Min Goi
Conference proceedings CANS 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6467)

Table of contents

  1. Front Matter
  2. Block Ciphers

    1. Asli Bay, Jorge Nakahara Jr., Serge Vaudenay
      Pages 1-19
    2. Chang N. Zhang, Qian Yu, Xiao Wei Liu
      Pages 31-42
  3. Invited Talk I

  4. Wireless Network Security

  5. Hash Functions

    1. Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen
      Pages 96-105
    2. Marine Minier, Raphael C. -W. Phan, Benjamin Pousse
      Pages 106-123
    3. Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
      Pages 124-139
  6. Public Key Cryptography

    1. Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner
      Pages 140-155
    2. Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani
      Pages 156-168
    3. Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski
      Pages 169-183
  7. Invited Talk II

  8. Secure Mechanisms

    1. Tsz Hon Yuen, Willy Susilo, Yi Mu
      Pages 201-220
    2. Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou
      Pages 221-240
    3. Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu
      Pages 241-260
  9. Cryptographic Protocols

    1. Guomin Yang, Chik How Tan
      Pages 261-277

About these proceedings

Introduction

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who assisted with reviewing and the CANS Steering Committee for their help. We thank Shai Halevi for use of his Web-Submission-and-Review software that was used for the electronic s- mission and review of the submitted papers, and we thank the International Association for Cryptologic Research (IACR) for Web hosting of the software.

Keywords

AES CCMP Crib SHA-3 Skein X.509 block ciphers cryptanalysis cryptographic protocols cryptography cryptology hash functions networks wireless networks wireless sensor

Editors and affiliations

  • Swee-Huay Heng
    • 1
  • Rebecca N. Wright
    • 2
  • Bok-Min Goi
    • 3
  1. 1.Faculty of Information Science and TechnologyMultimedia UniversityMelakaMalaysia
  2. 2.Department of Computer ScienceRutgers UniversityPiscatawayUSA
  3. 3.Faculty of Engineering and ScienceUniversiti Tunku Abdul RahmanKuala LumpurMalaysia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17619-7
  • Copyright Information Springer Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17618-0
  • Online ISBN 978-3-642-17619-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site