ACNS '09 - June 2-5, 2009
Paris-Rocquencourt, France

PROGRAM
ACNS '09 is organized by INRIA, CNRS and ENS, in France, in cooperation with the International Association for Cryptologic Research.
The conference (meetings, coffee breaks and lunches), will be held in building 1A of INRIA Paris-Rocquencourt
Tuesday, June 2nd
Schedule |
Amphitheater Lions – building 1A |
9:00 - 9:15 |
Welcome |
9:15 - 10:15 |
Can we settle cryptography's hash? - Antoine Joux |
10:15 - 10:45 |
Coffee break |
10:45 - 12:25 |
Key Exchange |
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys - Mark Manulis |
|
Session-state Reveal is stronger than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange protocol - Cas J.F. Cremers |
|
Secure Pairing of "Interface-Constrained" Devices Resistant Against Rushing User Behavior - Nitesh Saxena and Md. Borhan Uddin |
|
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results - Yvonne Cliff, Colin Boyd and Juan Gonzalez Nieto |
|
12:25 – 2:00 |
Lunch – Room Monet – building 1A |
2:00 - 3:40
|
Secure Computation |
Secure Hamming Distance based Computation and its Applications - Ayman Jarrous and Benny Pinkas |
|
Novel Precomputation Schemes for Elliptic Curve Cryptosystems - Patrick Longa and Catherine Gebotys |
|
Practical Secure Evaluation of Semi-Private Functions - Annika Paus, Ahmad-Reza Sadegh and Thomas Schneider |
|
Efficient Robust Private Set Intersection - Dana Dachman-Soled, Tal Malkin, Mariana Raykova and Moti Yung |
|
3:40 – 4:10 |
Coffee break |
4:10 - 5:50 |
Public Key Encryption |
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack - Joonsang Baek, Willy Susilo, Joseph K. Liu and Jianying Zhou |
|
An Efficient Identity-Based Online/Offline Encryption Scheme - Joseph K. Liu and Jianying Zhou |
|
Dual-Policy Attribute Based Encryption - Nuttapong Attrapadung and Hideki Imai |
|
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions - Seiko Arita and Koji Tsurudome |
Wednesday, June 3rd
Schedule |
Amphitheater Lions – building 1A |
9:00 - 10:00 |
Voice over IP: Risks, Threats and Vulnerabilities - Angelos D. Keromytis |
10:00 - 10:50 |
Network Security – 1 |
Malyzer: Defeating Anti-detection for Application-level Malware Analysis - Lei Liu and Songqing Chen |
|
A New Message Recognition Protocol With Self-Recoverability For Ad Hoc Pervasive Networks - Ian Goldberg, Atefeh Mashatan and Douglas R. Stinson |
|
10:50 - 11:20 |
Coffee break |
11:20 - 12:10 |
Traitor Tracing |
Breaking Two k-resilient Traitor Tracing Schemes with Sublinear Ciphertext Size - MoonShik Lee, Daegun Ma and MinJae Seo |
|
Tracing and Revoking Pirate Rebroadcasts - Aggelos Kiayias and Serdar Pehlivanoglu |
|
12:10 – 12:15 |
Short break |
12:15 - 1:00 |
Industrial Track |
Key Levels and Securing Key Predistribution Against Node Captures - Miroslaw Kutylowski |
|
Bootstrapping Key Pre-Distribution: Secure, Scalable and User-Friendly Initialization of Sensor Nodes - Nitesh Saxena, Md. Borhan Uddin |
|
Attacking and Repairing the Improved ModOnions Protocol - Nikita Borisov, Marek Klonowski, Mirosław Kutyłwski, Anna Lauks-Dutka |
|
Discussion of technical method for international person authentication over network - Xiangyi Hu, Guifen Zhao, Ying Li |
|
1:00 – 2:30 |
Lunch – Room Monet – building 1A |
Thursday, June 4th
Schedule |
Amphitheater Lions – building 1A |
9:00 - 10:40 |
Authentication/Anonymity |
Efficient Deniable Authentication for Standard Signatures - Jean Monnerat, Sylvain Pasini and Serge Vaudenay |
|
Homomorphic MACs: MAC-based Integrity for Network Coding - Shweta Agrawal and Dan Boneh |
|
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices using PIN - Yuichi Komano, Kazuo Ohta, Hideyuki Miyake and Atsushi Shimbo |
|
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks - Jörg Lenhard, Karsten Loesing and Guido Wirtz |
|
10:40 - 11:10 |
Coffee break |
11:10 - 12:25 |
Cryptanalysis of Hash Functions |
Cryptanalysis of Twister - Florian Mendel and Christian Rechberger and Martin Schläffer |
|
Cryptanalysis of CubeHash - Eric Brier and Thomas Peyrin |
|
Collision attack on Boole - Florian Mendel, Tomislav Nad and Martin Schläffer |
|
12:25 – 2:00 |
Lunch – Room Monet – building 1A |
2:00 - 3:00 |
Better Architectures and New Applications for Coarse Network Monitoring - Mike Reiter |
3:00 – 3:30 |
Coffee break |
3:30 – 4:45 |
Network Security – 2 |
Integrity Protection for Revision Control - Christian Cachin and Martin Geisler |
|
Fragility of the Robust Security Network: 802.11 Denial of Service - Martin Eian |
|
Fast Packet Classification using Condition Factorization - Alok Tongaonkar, R. Sekar and Sreenaath Vasudevan |
Friday, June 5th
Schedule |
Amphitheater Lions – building 1A |
9:00 - 10:00 |
Fully Homomorphic Encryption Using Ideal Lattices - Craig Gentry |
10:00 – 11:15 |
Lattices |
Choosing NTRU Parameters in Light of Combined Lattice - P. Hirschhorn, J. Hoffstein, N. Howgrave-Graham and W. Whyte |
|
Broadcast Attacks against Lattice-based Cryptosystems - Thomas Plantard and Willy Susilo |
|
Partial Key Exposure Attack on CRT-RSA - Santanu Sarkar and Subhamoy Maitra |
|
11:15 - 11:45 |
Coffee break |
11:45 - 1:00 |
Side-Channel Attacks |
How to Compare Profiled Side-Channel Attacks? - F.-X. Standaert, F. Koeune and W. Schindler |
|
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis - Emmanuel Prouff and Matthieu Rivain |
|
Attacking ECDSA-Enabled RFID Devices - Michael Hutter, Marcel Medwed, Daniel Hein and Johannes Wolkerstorfer |
|
1:00 – 2:30 |
Lunch – Room Monet – building 1A |