


default search action
7th ACNS 2009: Paris-Rocquencourt, France
- Michel Abdalla

, David Pointcheval
, Pierre-Alain Fouque
, Damien Vergnaud:
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings. Lecture Notes in Computer Science 5536, 2009, ISBN 978-3-642-01956-2
Key Exchange
- Mark Manulis

:
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. 1-19 - Cas J. F. Cremers:

Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. 20-33 - Nitesh Saxena, Md. Borhan Uddin

:
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. 34-52 - Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:

How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. 53-70
Secure Computation
- Patrick Longa, Catherine H. Gebotys:

Novel Precomputation Schemes for Elliptic Curve Cryptosystems. 71-88 - Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider

:
Practical Secure Evaluation of Semi-private Functions. 89-106 - Ayman Jarrous, Benny Pinkas:

Secure Hamming Distance Based Computation and Its Applications. 107-124 - Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:

Efficient Robust Private Set Intersection. 125-142
Public-Key Encryption
- Joonsang Baek

, Willy Susilo
, Joseph K. Liu
, Jianying Zhou
:
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. 143-155 - Joseph K. Liu

, Jianying Zhou
:
An Efficient Identity-Based Online/Offline Encryption Scheme. 156-167 - Nuttapong Attrapadung, Hideki Imai:

Dual-Policy Attribute Based Encryption. 168-185 - Seiko Arita, Koji Tsurudome:

Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. 186-200
Network Security I
- Lei Liu, Songqing Chen:

Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. 201-218 - Ian Goldberg, Atefeh Mashatan

, Douglas R. Stinson:
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. 219-237
Traitor Tracing
- MoonShik Lee, Daegun Ma, MinJae Seo:

Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. 238-252 - Aggelos Kiayias, Serdar Pehlivanoglu:

Tracing and Revoking Pirate Rebroadcasts. 253-271
Authentication and Anonymity
- Jean Monnerat, Sylvain Pasini, Serge Vaudenay:

Efficient Deniable Authentication for Signatures. 272-291 - Shweta Agrawal, Dan Boneh:

Homomorphic MACs: MAC-Based Integrity for Network Coding. 292-305 - Yuichi Komano

, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo:
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. 306-323 - Jörg Lenhard

, Karsten Loesing, Guido Wirtz
:
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. 324-341
Hash Functions
- Florian Mendel

, Christian Rechberger, Martin Schläffer:
Cryptanalysis of Twister. 342-353 - Eric Brier, Thomas Peyrin:

Cryptanalysis of CubeHash. 354-368 - Florian Mendel

, Tomislav Nad, Martin Schläffer:
Collision Attack on Boole. 369-381
Network Security II
- Christian Cachin, Martin Geisler:

Integrity Protection for Revision Control. 382-399 - Martin Eian:

Fragility of the Robust Security Network: 802.11 Denial of Service. 400-416 - Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan:

Fast Packet Classification Using Condition Factorization. 417-436
Lattices
- Philip S. Hirschhorn, Jeffrey Hoffstein

, Nick Howgrave-Graham, William Whyte:
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. 437-455 - Thomas Plantard

, Willy Susilo
:
Broadcast Attacks against Lattice-Based Cryptosystems. 456-472 - Santanu Sarkar

, Subhamoy Maitra:
Partial Key Exposure Attack on CRT-RSA. 473-484
Side-Channel Attacks
- François-Xavier Standaert

, François Koeune, Werner Schindler:
How to Compare Profiled Side-Channel Attacks?. 485-498 - Emmanuel Prouff, Matthieu Rivain:

Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. 499-518 - Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer:

Attacking ECDSA-Enabled RFID Devices. 519-534

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














