© 2008

Cryptology and Network Security

7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

  • Matthew K. Franklin
  • Lucas Chi Kwong Hui
  • Duncan S. Wong
Conference proceedings CANS 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5339)

Table of contents

  1. Front Matter
  2. Cryptosystems

    1. Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
      Pages 1-17
    2. Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan
      Pages 18-30
    3. Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda
      Pages 31-48
    4. Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang
      Pages 49-63
  3. Signatures

    1. Raylin Tso, Xun Yi, Xinyi Huang
      Pages 64-79
    2. Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu
      Pages 80-97
    3. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
      Pages 108-119
  4. Identification, Authentication and Key Management

    1. Michel Abdalla, Malika Izabachène, David Pointcheval
      Pages 133-148
    2. Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 149-161
  5. Cryptographic Algorithms and Protocols

    1. Youming Qiao, Christophe Tartary
      Pages 162-177
    2. Tiancheng Lou, Christophe Tartary
      Pages 196-213
    3. Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Kato, Yoshitaka Morikawa
      Pages 226-239
  6. Stream Ciphers and Block Ciphers

    1. Mohammad Ali Orumiehchi, S. Fahimeh Mohebbipoor, Hossein Ghodosi
      Pages 240-251
    2. Jorge Nakahara Jr.
      Pages 252-267
  7. Cryptographic Foundations

About these proceedings


This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, held in Hong-Kong, China, in December 2008.

The 27 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections on cryptosystems, signatures, identification, authentication and key management, cryptographic algorithms and protocols, stream ciphers and block ciphers, cryptographic foundations, applications and implementations, as well as security in ad hoc networks and wireless sensor networks.


AES DoS attacks ad hoc networks anonymity authentication block ciphers cryptanalysis cryptographic protocols cryptography digital signature elliptic curve cryptography encryption group signatures network security security

Editors and affiliations

  • Matthew K. Franklin
    • 1
  • Lucas Chi Kwong Hui
    • 2
  • Duncan S. Wong
    • 3
  1. 1.Department of Computer ScienceUniversity of CaliforniaDavisUSA
  2. 2.Department of Computer ScienceThe University of Hong KongHong KongChina
  3. 3.Department of Computer ScienceCity University of Hong KongHong KongHong Kong

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking