000 03414cam a2200349 a 4500
008 100309s2009 nyu 000 0 eng
010 _a2009929955
020 _a9783642019562 (softcover : alk. paper)
035 _a(Sirsi) u4614
040 _aEG-CaNU
_c EG-CaNU
_d EG-CaNU
042 _ancode
082 0 4 _a005.8
245 0 0 _aApplied cryptography and network security :
_b 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. proceedings /
_c [edited by] Michel Abdalla, David Pointcheval, Pierre-Alain Fouque.
250 _a1st ed.
260 _aNew York :
_b Springer,
_c 2009.
300 _ap. cm.
490 0 _aLecture notes in computer science ;
_v 5536
505 _aGroup Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- Add to marked items Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Tracing and Revoking Pirate Rebroadcasts .
520 _aThis book constitutes the refereed proceedings of the 7th International Conference on Applied Cryptography and Network Security, ACNS 2009, held in Paris-Rocquencourt, France, in June 2009.The 32 revised full papers presented were carefully reviewed and selected from 150 submissions. The papers are organized in topical sections on key exchange, secure computation, public-key encryption, network security, traitor tracing, authentication and anonymity, hash fundtions, lattices, and side-channel attacks.
650 0 _aCommunication Networks
_99215
650 0 _aDatabase management
_x Computer programs.
_99216
650 0 _aSecurity and Cryptology
_99217
650 0 _aTheoretical computer science and general issues
_92787
653 _aad hoc networks
653 _aciphertext attack
653 _acryptanalysis
653 _ainternet security
700 1 _a Abdalla , Michel
_99218
920 _a3642019560 (softcover : alk. paper)
596 _a1
999 _c3618
_d3618