Skip to main content
  • Conference proceedings
  • © 2009

Cryptology and Network Security

8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5888)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Cryptographic Protocol and Schemes I

    1. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima

      • Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
      Pages 1-20
    2. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security

      • G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
      Pages 21-40
  3. Invited Talk 1

  4. Cryptanalysis I

    1. Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT

      • Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang
      Pages 58-75
    2. Saturation Attack on the Block Cipher HIGHT

      • Peng Zhang, Bing Sun, Chao Li
      Pages 76-86
    3. Extensions of the Cube Attack Based on Low Degree Annihilators

      • Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk
      Pages 87-102
    4. An Analysis of the Compact XSL Attack on BES and Embedded SMS4

      • Jiali Choy, Huihui Yap, Khoongming Khoo
      Pages 103-118
  5. Wireless and Sensor Network Security I

    1. Anonymizer-Enabled Security and Privacy for RFID

      • Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
      Pages 134-153
  6. Network Security

    1. DepenDNS: Dependable Mechanism against DNS Cache Poisoning

      • Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin
      Pages 174-188
  7. Privacy and Anonymity

    1. Privacy-Preserving Relationship Path Discovery in Social Networks

      • Ghita Mezzour, Adrian Perrig, Virgil Gligor, Panos Papadimitratos
      Pages 189-208
    2. Verifying Anonymous Credential Systems in Applied Pi Calculus

      • Xiangxi Li, Yu Zhang, Yuxin Deng
      Pages 209-225
    3. Transferable Constant-Size Fair E-Cash

      • Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
      Pages 226-247
  8. Functional and Searchable Encryption

    1. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle

      • Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang
      Pages 248-258
    2. Private-Key Hidden Vector Encryption with Key Confidentiality

      • Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
      Pages 259-277
  9. Invited Talk 2

Other Volumes

  1. Cryptology and Network Security

About this book

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology and Network Security, CANS 2009, held in Kanazawa, Japan, in December 2009. The 32 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on cryptographic protocols and schemes; cryptanalysis; wireless and sensor security; network security; privacy and anonymity; functional and searchable encryption; authentication; block cipher design; and algebraic and number-theoretic schemes.

Editors and Affiliations

  • AT&T Labs Research, NJ, USA

    Juan A. Garay

  • Japan Advanced Institute of Science and Technology (JAIST), Nomi, Japan

    Atsuko Miyaji

  • National Institute of Advanced Industrial Science and Technoloy (AIST), Tokyo, Japan

    Akira Otsuka

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access