Omschrijving
This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China in December 2006.
The 26 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on encryption, key exchange, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, as well as disponibility and reliability. This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS 2006, held in Suzhou, China, December 2006. The 26 revised full papers and 2 invited papers cover encryption, authentication and signatures, proxy signatures, cryptanalysis, implementation, steganalysis and watermarking, boolean functions and stream ciphers, intrusion detection, and disponibility and reliability. Encryption
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems
1(18)
Jaimee Brown
Juan Manuel Gonzalez Nieto
Colin Boyd
Efficient Identity-Based Encryption with Tight Security Reduction
19(18)
Nuttapong Attrapadung
Jun Furukawa
Takeshi Gomi
Goichiro Hanaoka
Hideki Imai
Rui Zhang
Key Exchange
A Diffie-Hellman Key Exchange Protocol Without Random Oracles
37(18)
Ik Rae Jeong
Jeong Ok Kwon
Dong Hoon Lee
Authenticated Group Key Agreement for Multicast
55(18)
Liming Wang
Chuan-Kun Wu
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks
73(17)
Hongsong Shi
Mingxing He
Zhiguang Qin
Authentication and Signatures
Efficient Mutual Data Authentication Using Manually Authenticated Strings
90(18)
Sven Laur
Kaisa Nyberg
Achieving Multicast Stream Authentication Using MDS Codes
108(18)
Christophe Tartary
Huaxiong Wang
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps
126(18)
Sujing Zhou
Dongdai Lin
Proxy Signatures
Security Model of Proxy-Multi Signature Schemes
144(9)
Feng Cao
Zhenfu Cao
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque
153(15)
Rongxing Lu
Zhenfu Cao
Xiaolei Dong
Cryptanalysis
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
168(14)
Tae Hyun Kim
Tsuyoshi Takagi
Dong-Guk Han
Ho Won Kim
Jongin Lim
Improved Collision Attack on Reduced Round Camellia
182(9)
Jie Guan
Zhongya Zhang
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks
191(12)
Zbigniew Golebiewski
Miroslaw Kutylowski
Filip Zagoaski
Implementation
Bitslice Implementation of AES
203(10)
Chester Rebeiro
David Selvakumar
A.S.L. Devi
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3)
213(11)
Jianqin Zhou
Qiang Zheng
Steganalysis and Watermarking
Steganalysis Based on Differential Statistics
224(17)
Zugen Liu
Lingdi Ping
Jian Chen
Jimin Wang
Xuezeng Pan
Watermarking Essential Data Structures for Copyright Protection
241(18)
Qutaiba Albluwi
Ibrahim Kamel
Boolean Functions and Stream Ciphers
A Note of Perfect Nonlinear Functions
259(11)
Xiyong Zhang
Hua Guo
Jinjiang Yuan
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing
270(16)
Xiaomin Wang
Jiashu Zhang
Wenfang Zhang
Intrusion Detection
Cooperative Intrusion Detection for Web Applications
286(17)
!Nathalie Dagorn
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis
303(15)
Jianhua Yang
Byong Lee
Yongzhong Zhang
Smart Architecture for High-Speed Intrusion Detection and Prevention Systems
318(11)
Chih-Chiang Wu
Sung-Hua Wen
Nen-Fu Huang
A Multi-agent Cooperative Model and System for Integrated Security Monitoring
329(13)
Xianxian Li
Lijun Liu
Disponibility and Reliability
Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network
342(12)
Jian Kang
Yuan Zhang
Jiu-bin Ju
An Immune-Based Model for Service Survivability
354(10)
Jinquan Zeng
Xiaojie Liu
Tao Li
Feixian Sun
Lingxi Peng
Caiming Liu
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks
364(17)
Lan Yu
Willy Susilo
Rei Safavi-Naini
Author Index
381