Applied Cryptography and Network Security

8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings

  • Jianying Zhou
  • Moti Yung
Conference proceedings ACNS 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6123)

Table of contents

  1. Front Matter
  2. Public Key Encryption

    1. Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
      Pages 1-18
    2. Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing
      Pages 19-34
  3. Digital Signature

    1. Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee
      Pages 53-68
    2. Markus Rückert, Michael Schneider, Dominique Schröoder
      Pages 69-86
    3. Christina Brzuska, Heike Busch, Oezguer Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser et al.
      Pages 87-104
  4. Block Ciphers and Hash Functions

    1. Baudoin Collard, Francois-Xavier Standaert
      Pages 123-138
    2. Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang
      Pages 139-153
    3. Nicolas Méloni, Christophe Négre, M. Anwar Hasan
      Pages 154-167
  5. Side-Channel Attacks

    1. Nicolas Veyrat-Charvillon, François-Xavier Standaert
      Pages 186-199
    2. Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
      Pages 200-217
  6. Zero Knowledge and Multi-party Protocols

    1. Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
      Pages 218-235
    2. Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
      Pages 255-272
    3. Aggelos Kiayias, Serdar Pehlivanoglu
      Pages 273-290
  7. Key Management

    1. Julien Bringer, Hervé Chabanne, Thomas Icart
      Pages 291-308
    2. Rosario Gennaro, Hugo Krawczyk, Tal Rabin
      Pages 309-328
    3. Andrew C. Yao, Yunlei Zhao
      Pages 329-348
  8. Authentication and Identification

    1. Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
      Pages 349-366
    2. Chengfang Fang, Qiming Li, Ee-Chien Chang
      Pages 367-383
    3. Atefeh Mashatan, Serge Vaudenay
      Pages 384-401
  9. Privacy and Anonymity

    1. Mark Manulis, Bertram Poettering, Gene Tsudik
      Pages 402-419
    2. Mark Manulis, Benny Pinkas, Bertram Poettering
      Pages 420-437
    3. Helger Lipmaa, Bingsheng Zhang
      Pages 438-455
    4. Bogdan Carbunar, Radu Sion
      Pages 456-474
  10. RFID Security and Privacy

    1. Junzuo Lai, Robert H. Deng, Yingjiu Li
      Pages 475-492
    2. Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
      Pages 493-510
  11. Internet Security

    1. Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi Sandhu
      Pages 511-528
    2. Wei Xu, Sencun Zhu, Heng Xu
      Pages 529-544
  12. Back Matter

About these proceedings


ACNS 2010, the 8th International Conference on Applied Cryptography and Network Security, was held in Beijing, China, during June 22-25, 2010. ACNS 2010 brought together individuals from academia and industry involved in m- tiple research disciplines of cryptography and security to foster the exchange of ideas. ACNS was initiated in 2003, and there has been a steady improvement in the quality of its program over the past 8 years: ACNS 2003 (Kunming, China), ACNS 2004 (Yellow Mountain, China), ACNS 2005 (New York, USA), ACNS 2006 (Singapore), ACNS 2007 (Zhuhai, China), ACNS 2008 (New York, USA), ACNS2009(Paris,France). Theaverageacceptanceratehasbeenkeptataround 17%, and the average number of participants has been kept at around 100. The conference received a total of 178 submissions from all over the world. Each submission was assigned to at least three committee members. Subm- sions co-authored by members of the Program Committee were assigned to at least four committee members. Due to the large number of high-quality s- missions, the review process was challenging and we are deeply grateful to the committee members and the external reviewers for their outstanding work. - ter extensive discussions, the Program Committee selected 32 submissions for presentation in the academic track, and these are the articles that are included in this volume (LNCS 6123). Additionally, a few other submissionswereselected for presentation in the non-archival industrial track.


AES RFID RSA algorithms authentication calculus complexity cryptanalysis cryptography hash function

Editors and affiliations

  • Jianying Zhou
    • 1
  • Moti Yung
    • 2
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-13707-5
  • Online ISBN 978-3-642-13708-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences