default search action
7th ACNS 2009: Paris-Rocquencourt, France
- Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud:
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Lecture Notes in Computer Science 5536, 2009, ISBN 978-3-642-01956-2
Key Exchange
- Mark Manulis:
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. 1-19 - Cas J. F. Cremers:
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. 20-33 - Nitesh Saxena, Md. Borhan Uddin:
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. 34-52 - Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. 53-70
Secure Computation
- Patrick Longa, Catherine H. Gebotys:
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. 71-88 - Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider:
Practical Secure Evaluation of Semi-private Functions. 89-106 - Ayman Jarrous, Benny Pinkas:
Secure Hamming Distance Based Computation and Its Applications. 107-124 - Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:
Efficient Robust Private Set Intersection. 125-142
Public-Key Encryption
- Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou:
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. 143-155 - Joseph K. Liu, Jianying Zhou:
An Efficient Identity-Based Online/Offline Encryption Scheme. 156-167 - Nuttapong Attrapadung, Hideki Imai:
Dual-Policy Attribute Based Encryption. 168-185 - Seiko Arita, Koji Tsurudome:
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. 186-200
Network Security I
- Lei Liu, Songqing Chen:
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. 201-218 - Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. 219-237
Traitor Tracing
- MoonShik Lee, Daegun Ma, MinJae Seo:
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. 238-252 - Aggelos Kiayias, Serdar Pehlivanoglu:
Tracing and Revoking Pirate Rebroadcasts. 253-271
Authentication and Anonymity
- Jean Monnerat, Sylvain Pasini, Serge Vaudenay:
Efficient Deniable Authentication for Signatures. 272-291 - Shweta Agrawal, Dan Boneh:
Homomorphic MACs: MAC-Based Integrity for Network Coding. 292-305 - Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo:
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. 306-323 - Jörg Lenhard, Karsten Loesing, Guido Wirtz:
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. 324-341
Hash Functions
- Florian Mendel, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. 342-353 - Eric Brier, Thomas Peyrin:
Cryptanalysis of CubeHash. 354-368 - Florian Mendel, Tomislav Nad, Martin Schläffer:
Collision Attack on Boole. 369-381
Network Security II
- Christian Cachin, Martin Geisler:
Integrity Protection for Revision Control. 382-399 - Martin Eian:
Fragility of the Robust Security Network: 802.11 Denial of Service. 400-416 - Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan:
Fast Packet Classification Using Condition Factorization. 417-436
Lattices
- Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte:
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. 437-455 - Thomas Plantard, Willy Susilo:
Broadcast Attacks against Lattice-Based Cryptosystems. 456-472 - Santanu Sarkar, Subhamoy Maitra:
Partial Key Exposure Attack on CRT-RSA. 473-484
Side-Channel Attacks
- François-Xavier Standaert, François Koeune, Werner Schindler:
How to Compare Profiled Side-Channel Attacks?. 485-498 - Emmanuel Prouff, Matthieu Rivain:
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. 499-518 - Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer:
Attacking ECDSA-Enabled RFID Devices. 519-534
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.