default search action
8. CANS 2009: Kanazawa, Japan
- Juan A. Garay, Atsuko Miyaji, Akira Otsuka:
Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings. Lecture Notes in Computer Science 5888, Springer 2009, ISBN 978-3-642-10432-9
Cryptographic Protocol and Schemes I
- Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. 1-20 - G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. 21-40 - Marc Joye:
On Cryptographic Schemes Based on Discrete Logarithms and Factoring. 41-52
Invited Talk 1
- Adam D. Smith:
Asymptotically Optimal and Private Statistical Estimation. 53-57
Cryptanalysis I
- Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang:
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. 58-75 - Peng Zhang, Bing Sun, Chao Li:
Saturation Attack on the Block Cipher HIGHT. 76-86 - Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk:
Extensions of the Cube Attack Based on Low Degree Annihilators. 87-102 - Jiali Choy, Huihui Yap, Khoongming Khoo:
An Analysis of the Compact XSL Attack on BES and Embedded SMS4. 103-118
Wireless and Sensor Network Security I
- Chong Hee Kim, Gildas Avoine:
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. 119-133 - Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann:
Anonymizer-Enabled Security and Privacy for RFID. 134-153 - Nitesh Saxena, Md. Borhan Uddin:
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. 154-173
Network Security
- Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin:
DepenDNS: Dependable Mechanism against DNS Cache Poisoning. 174-188
Privacy and Anonymity
- Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos:
Privacy-Preserving Relationship Path Discovery in Social Networks. 189-208 - Xiangxi Li, Yu Zhang, Yuxin Deng:
Verifying Anonymous Credential Systems in Applied Pi Calculus. 209-225 - Georg Fuchsbauer, David Pointcheval, Damien Vergnaud:
Transferable Constant-Size Fair E-Cash. 226-247
Functional and Searchable Encryption
- Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. 248-258 - Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano:
Private-Key Hidden Vector Encryption with Key Confidentiality. 259-277
Invited Talk 2
- Adrian Perrig:
Building Secure Networked Systems with Code Attestation. 278
Authentication
- Xavier Boyen:
HPAKE : Password Authentication Secure against Cross-Site User Impersonation. 279-298 - Wenting Jin, Jing Xu:
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. 299-314 - Christophe Tartary:
Ensuring Authentication of Digital Information Using Cryptographic Accumulators. 315-333
Block Cipher Design
- Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki:
MIBS: A New Lightweight Block Cipher. 334-348
Cryptanalysis II
- Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. 349-361 - Martin Ågren, Thomas Johansson, Martin Hell:
Improving the Rainbow Attack by Reusing Colours. 362-378 - Lin Yang, Meiqin Wang, Siyuan Qiao:
Side Channel Cube Attack on PRESENT. 379-391 - Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner:
Algebraic Attack on the MQQ Public Key Cryptosystem. 392-401
Algebraic and Number-Theoretic Schemes
- Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. 402-412 - Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez:
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. 413-432 - Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya:
On the Complexity of Computing Discrete Logarithms over Algebraic Tori. 433-442
Wireless and Sensor Network Security II
- Mario Cagalj, Nitesh Saxena, Ersin Uzun:
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. 443-462 - Erik Dahmen, Christoph Krauß:
Short Hash-Based Signatures for Wireless Sensor Networks. 463-476
Invited Talk 3
- Craig Gentry:
Computing on Encrypted Data. 477
Cryptographic Protocol and Schemes II
- Timo Brecher, Emmanuel Bresson, Mark Manulis:
Fully Robust Tree-Diffie-Hellman Group Key Exchange. 478-497 - Benoît Libert, Damien Vergnaud:
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. 498-517 - Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi:
Relinkable Ring Signature. 518-536
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.