ACNS '09 - June 2-5, 2009

Paris-Rocquencourt, France



ACNS '09 is organized by INRIA, CNRS and ENS, in France, in cooperation with the International Association for Cryptologic Research.

The conference (meetings, coffee breaks and lunches), will be held in building 1A of INRIA Paris-Rocquencourt

Tuesday, June 2nd


Amphitheater Lions – building 1A

9:00 - 9:15


9:15 - 10:15

Can we settle cryptography's hash? - Antoine Joux

10:15 - 10:45

Coffee break

10:45 - 12:25

Key Exchange

Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys - Mark Manulis

Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol - Cas J.F. Cremers

Secure Pairing of "Interface-Constrained" Devices Resistant Against Rushing User Behavior - Nitesh Saxena and Md. Borhan Uddin

How to Extract and Expand Randomness: A Summary and Explanation of Existing Results - Yvonne Cliff, Colin Boyd and Juan Gonzalez Nieto

12:25 – 2:00

Lunch – Room Monet – building 1A


2:00 - 3:40



Secure Computation

Secure Hamming Distance based  Computation and its  Applications - Ayman Jarrous and Benny Pinkas

Novel Precomputation Schemes for Elliptic Curve Cryptosystems - Patrick Longa and Catherine Gebotys

Practical Secure Evaluation of Semi-Private Functions - Annika Paus, Ahmad-Reza Sadegh and Thomas Schneider

Efficient Robust Private Set Intersection - Dana Dachman-Soled, Tal Malkin, Mariana Raykova and Moti Yung

3:40 – 4:10

Coffee break

4:10 - 5:50

Public Key Encryption

A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack - Joonsang Baek, Willy Susilo, Joseph K. Liu and Jianying Zhou

An Efficient Identity-Based Online/Offline  Encryption Scheme - Joseph K. Liu and Jianying Zhou

Dual-Policy Attribute Based Encryption - Nuttapong Attrapadung and Hideki Imai

Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions - Seiko Arita and Koji Tsurudome

Wednesday, June 3rd


Amphitheater Lions – building 1A

9:00 - 10:00

Voice over IP: Risks, Threats and Vulnerabilities - Angelos D. Keromytis

10:00 - 10:50

Network Security – 1

Malyzer: Defeating Anti-detection for Application-level Malware Analysis - Lei Liu and Songqing Chen

A New Message Recognition Protocol With Self-Recoverability For Ad Hoc Pervasive Networks - Ian Goldberg, Atefeh Mashatan and Douglas R. Stinson

10:50 - 11:20

Coffee break

11:20 - 12:10

Traitor Tracing

Breaking Two k-resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -  MoonShik Lee, Daegun Ma and MinJae Seo

Tracing and Revoking Pirate Rebroadcasts - Aggelos Kiayias and Serdar Pehlivanoglu

12:10 – 12:15

Short break

12:15 - 1:00

Industrial Track

Key Levels and Securing Key Predistribution Against Node Captures - Miroslaw Kutylowski

Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes - Nitesh Saxena, Md. Borhan Uddin

Attacking and Repairing the Improved ModOnions Protocol - Nikita Borisov, Marek Klonowski, Mirosław Kutyłwski, Anna Lauks-Dutka

Discussion of technical method for international person authentication over network - Xiangyi Hu, Guifen Zhao, Ying Li

1:00 – 2:30

Lunch – Room Monet – building 1A


Thursday, June 4th


Amphitheater Lions – building 1A

9:00 - 10:40


Efficient Deniable Authentication for Standard Signatures - Jean Monnerat, Sylvain Pasini and Serge Vaudenay

Homomorphic MACs:  MAC-based Integrity for Network Coding - Shweta Agrawal and Dan Boneh

Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices using PIN - Yuichi Komano, Kazuo Ohta, Hideyuki Miyake and Atsushi Shimbo

Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks - Jörg Lenhard, Karsten Loesing  and Guido Wirtz

10:40 - 11:10

Coffee break

11:10 - 12:25

Cryptanalysis of Hash Functions

Cryptanalysis of Twister - Florian Mendel and Christian Rechberger and Martin Schläffer

Cryptanalysis of CubeHash - Eric Brier and Thomas Peyrin

Collision attack on Boole - Florian Mendel, Tomislav Nad and Martin Schläffer

12:25 – 2:00

Lunch – Room Monet – building 1A

2:00 - 3:00

Better Architectures and New Applications for Coarse Network Monitoring - Mike Reiter

3:00 – 3:30

Coffee break

3:30 – 4:45

Network Security – 2

Integrity Protection for Revision Control - Christian Cachin and Martin Geisler

Fragility of the Robust Security Network: 802.11 Denial of Service - Martin Eian

Fast Packet Classification using Condition Factorization - Alok Tongaonkar, R. Sekar and Sreenaath Vasudevan


Friday, June 5th  


Amphitheater Lions – building 1A

9:00 - 10:00

Fully Homomorphic Encryption Using Ideal Lattices - Craig Gentry

10:00 – 11:15


Choosing NTRU Parameters in Light of Combined Lattice - P. Hirschhorn, J. Hoffstein, N. Howgrave-Graham and W. Whyte

Broadcast Attacks against Lattice-based Cryptosystems - Thomas Plantard and Willy Susilo

Partial Key Exposure Attack on CRT-RSA - Santanu Sarkar and Subhamoy Maitra

11:15 - 11:45

Coffee break

11:45 - 1:00

Side-Channel Attacks

How to Compare Profiled Side-Channel Attacks? - F.-X. Standaert, F. Koeune and W. Schindler

Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis - Emmanuel Prouff and Matthieu Rivain

Attacking ECDSA-Enabled RFID Devices - Michael Hutter, Marcel Medwed, Daniel Hein and Johannes Wolkerstorfer

1:00 – 2:30

Lunch – Room Monet – building 1A