Cryptology and Network Security

5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006. Proceedings

  • David Pointcheval
  • Yi Mu
  • Kefei Chen
Conference proceedings CANS 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4301)

Table of contents

  1. Front Matter
  2. Encryption

    1. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
      Pages 1-18
    2. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang
      Pages 19-36
  3. Key Exchange

    1. Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
      Pages 37-54
    2. Liming Wang, Chuan-Kun Wu
      Pages 55-72
  4. Authentication and Signatures

  5. Proxy Signatures

    1. Feng Cao, Zhenfu Cao
      Pages 144-152
    2. Rongxing Lu, Zhenfu Cao, Xiaolei Dong
      Pages 153-167
  6. Cryptanalysis

    1. Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
      Pages 168-181
    2. Guan Jie, Zhang Zhongya
      Pages 182-190
    3. Zbigniew Gołȩbiewski, Mirosław Kutyłowski, Filip Zagórski
      Pages 191-202
  7. Implementation

    1. Chester Rebeiro, David Selvakumar, A. S. L. Devi
      Pages 203-212
  8. Steganalysis and Watermarking

    1. Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan
      Pages 224-240
    2. Qutaiba Albluwi, Ibrahim Kamel
      Pages 241-258
  9. Boolean Functions and Stream Ciphers

    1. Xiyong Zhang, Hua Guo, Jinjiang Yuan
      Pages 259-269
    2. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang
      Pages 270-285
  10. Intrusion Detection

  11. Disponibility and Reliability

    1. Jinquan Zeng, Xiaojie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu
      Pages 354-363
    2. Lan Yu, Willy Susilo, Rei Safavi-Naini
      Pages 364-380
  12. Back Matter

About these proceedings


AES DDos attacks Distributed Denial of Service algorithm algorithms authentication communication cryotanalysis cryptographics cryptology encryption information hiding networks security trust

Editors and affiliations

  • David Pointcheval
    • 1
  • Yi Mu
    • 2
  • Kefei Chen
    • 3
  1. 1.Ecole Normale Supérieure – LIENS/CNRS/INRIA,France
  2. 2.Centre for Computer and Information Security Research School of Computer Science and Software EngineeringUniversity of WollongongAustralia
  3. 3.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software