Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / Edition 1

Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings / Edition 1

by Jianying Zhou
     
 

ISBN-10: 3642137075

ISBN-13: 9783642137075

Pub. Date: 06/09/2010

Publisher: Springer Berlin Heidelberg

This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010.
The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block

…  See more details below

Overview

This book constitutes the proceedings of the 8th International Conference on Applied Cryptography and Network Security, ACNS 2010, held in Beijing, China, in June 2010.
The 32 papers presented in this volume were carefully reviewed and selected from 178 submissions. The papers are divided in topical sections on public key encryption, digital signature, block ciphers and hash functions, side-channel attacks, zero knowledge and multi-party prools, key management, authentication and identification, privacy and anonymity, RFID security and privacy, and internet security.

Product Details

ISBN-13:
9783642137075
Publisher:
Springer Berlin Heidelberg
Publication date:
06/09/2010
Series:
Lecture Notes in Computer Science / Security and Cryptology Series, #6123
Edition description:
2010
Pages:
564
Product dimensions:
6.10(w) x 9.30(h) x 1.00(d)

Table of Contents

Public Key Encryption

On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption Damien Vergnaud Vergnaud, Damien 1

How to Construct Interval Encryption from Binary Tree Encryption Dongsheng Xing Xing, Dongsheng 19

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions Brent Waters Waters, Brent 35

Digital Signature

Trapdoor Sanitizable Signatures Made Easy Pil Joony Lee Lee, Pil Joony 53

Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs Dominique Schroder Schroder, Dominique 69

Redactable Signatures for Tree-Structured Data: Definitions and Constructions Dominique Schroder Schroder, Dominique 87

Block Ciphers and Hash Functions

Imposiible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions Chao Li Chao, Li 105

Multi-trail Statistical Saturation Attacks Francois-Xavier Standaert Standaert, Francois-Xavier 123

Multiset Collision Attacks on Reduced-Round SNOW 3G SNOW 3G⊗ Bin Zhang Bin, Zhang 139

High Performance GHASH Function for Long Messages M. Anwar Hasan Hasan, M. Anwar 154

Side-Channel Attacks

Principles on the Security of AES against First and Second-Order Differential Power Analysis Jerry den Hartog Hartog, Jerry den 168

Adaptive Chosen-Message Side-Channel Attacks Francois-Xavier Standaert Standaert, Francois-Xavier 186

Secure Multiplicative Masking of Powr Functions Michael Quisquater Quisquater, Michael 200

Zero Knowledge and Multi-Party Protocols

Batch Groth-Sahai Damien Vergnaud Vergnaud, Damien 218

Efficient and Secure Evaluation of Multivariate Polynomials and Applications Payman Mohassel Mohassel, Payman 236

Efficient Implementation of the Orlandi Protocol Janus Dam Nielsen Nielsen, Janus Dam 255

Improving the Round Complexity of Traitor Tracing Schemes Serdar Pehlivanoglu Pehlivanoglu, Serdar 273

Key Management

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters Thomas Icart Icart, Thomas 291

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Tal Rabin Rabin, Tal 309

Denialbe Internet Key Exchange Yunlei Zhao Zhao, Yunlei 329

Authentication and Identification

A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm Huaxiong Wang Wang, Huaxiong 349

Secure Sketch for Multiple Secrets Ee-Chien Chang Chang, Ee-Chien 367

A Message Recognition Protocol Based on Standard Assumptions Serge Vaudenay Vaudenay, Serge 384

Privacy and Anonymity

Affiliation-Hiding Key Exchange with untrusted Group Authorities Gene Tsudik Tsudik, Gene 402

Privacy-Preserving Group Discovery with Linear Complexity Bertram Poettering Poettering, Bertram 420

Two New Efficient PIR-Writing Protocols Bingsheng Zhang Zhang, Bingsheng 438

Regulatory Compliant Oblivious RAM Radu Sion Sion, Radu 456

RFID Security and Privacy

Revisiting Unpredictability-Based RFID Privacy Models Yingjju Li Li, Yingjju 475

On RFID Privacy with Mutual Authentication and Tag Corruption Christian Wachsmann Wachsmann, Christian 493

Internet Security

Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures Ravi Sandhu Sandhu, Ravi 511

COP: A Step toward Children Online Privacy Heng Xu Heng, Xu 529

A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising Xuhua Ding Ding, Xuhua 545

Author Index 563

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >