ACNS '09 - June 2-5, 2009
Paris-Rocquencourt, France

PROGRAM
ACNS '09 is organized by INRIA, CNRS and ENS, in France, in cooperation with the International Association for Cryptologic Research.
List of accepted papers
- Novel Precomputation Schemes for Elliptic Curve Cryptosystems
Patrick Longa, and Catherine Gebotys
(University of Waterloo, Canada) - Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices using PIN
Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, and Atsushi Shimbo
(Toshiba Corporation and The University of Electro-Communications, Japan) - An Efficient Identity-Based Online/Offline Encryption Scheme
Joseph K. Liu and Jianying Zhou
(I2R, Singapore) - A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Joonsang Baek, Willy Susilo, Joseph K. Liu, and Jianying Zhou
(I2R, Singapore and University of Wollongong, Australia) - Broadcast Attacks against Lattice-based Cryptosystems
Thomas Plantard and Willy Susilo
(University Of Wollongong, Australia) - Practical Secure Evaluation of Semi-Private Functions
Annika Paus, Ahmad-Reza Sadeghi, and Thomas Schneider
(Ruhr-University Bochum, Germany) - Dual-Policy Attribute Based Encryption
Nuttapong Attrapadung and Hideki Imai
(RCIS (AIST), Japan) - Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
Mark Manulis
(UCL Crypto Group, Belgium) - Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
Seiko Arita and Koji Tsurudome
(Institute of Information Security, Japan) - Fast Packet Classification using Condition Factorization
Alok Tongaonkar, R. Sekar, and Sreenaath Vasudevan
(Stony Brook University, NY, USA) - Cryptanalysis of Twister
Florian Mendel, Christian Rechberger, and Martin Schläffer
(Graz University of Technology, Austria) - Efficient Deniable Authentication for Standard Signatures
Jean Monnerat, Sylvain Pasini, and Serge Vaudenay
(SwissSign and EPFL, Switzerland) - Fragility of the Robust Security Network: 802.11 Denial of Service
Martin Eian
(Norwegian University of Science and Technology) - Integrity Protection for Revision Control
Christian Cachin and Martin Geisler
(IBM Zurich Research Laboratory and University of Aarhus) - Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol
Cas J.F. Cremers
(ETH Zurich) - A New Message Recognition Protocol With Self-Recoverability For Ad Hoc Pervasive Networks
Ian Goldberg, Atefeh Mashatan, and Douglas R. Stinson
(University of Waterloo, Canada) - Malyzer: Defeating Anti-detection for Application-level Malware Analysis
Lei Liu and Songqing Chen
(George Mason University) - Choosing NTRU Parameters in Light of Combined Lattice
P. Hirschhorn, J. Hoffstein, N. Howgrave-Graham, and W. Whyte
(NTRU Cryptosystems and Brown University) - How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Yvonne Cliff, Colin Boyd, and Juan Gonzalez Nieto
(Queensland University of Technology, Australia) - Homomorphic MACs: MAC-based Integrity for Network Coding
Shweta Agrawal and Dan Boneh
(University of Texas at Austin and Stanford University) - Partial Key Exposure Attack on CRT-RSA
Santanu Sarkar and Subhamoy Maitra
(Indian Statistical Institute) - Efficient Robust Private Set Intersection
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, and Moti Yung
(Columbia University and Google Inc.) - Secure Pairing of "Interface-Constrained" Devices Resistant Against Rushing User Behavior
Nitesh Saxena and Md. Borhan Uddin
(Polytechnic Institute of New York University) - Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Emmanuel Prouff and Matthieu Rivain
(Oberthur Technologies and University of Luxembourg) - Secure Hamming Distance based Computation and its Applications
Ayman Jarrous and Benny Pinkas
(University of Haifa) - Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Jörg Lenhard, Karsten Loesing, and Guido Wirtz
(University of Bamberg, Germany) - Attacking ECDSA-Enabled RFID Devices
Michael Hutter, Marcel Medwed, Daniel Hein, and Johannes Wolkerstorfer
(Graz University of Technology, Austria) - Cryptanalysis of CubeHash
Eric Brier and Thomas Peyrin
(Ingenico, France) - Breaking Two k-resilient Traitor Tracing Schemes with Sublinear Ciphertext Size
MoonShik Lee, Daegun Ma, and MinJae Seo
(Seoul National University, South Korea) - Collision attack on Boole
Florian Mendel, Tomislav Nad, and Martin Schläffer
(Graz University of Technology, Austria) - How to Compare Profiled Side-Channel Attacks?
F.-X. Standaert, F. Koeune, and W. Schindler
(UCL Crypto Group and BSI) - Tracing and Revoking Pirate Rebroadcasts
Aggelos Kiayias and Serdar Pehlivanoglu
(Univ. of Connecticut)