The 5th International Conference on Cryptology and Network Security

(CANS06, Suzhou, Dec. 8 - 10, 2006)


CANS06 is in co-operation with International Association for Cryptologic Research (IACR) and National Nature Science Foundation of China (NSFC)

Final Program

Call for Papers

Friday December 8
8:45 - 9:00 Opening Remarks
9:00 - 10:00 Invited Speaker: Moni Naor (Weizmann Institute, Israel) - Chair: David Pointcheval
Compressibility of NP Instances and Cryptographic Applications
Tea Break
Encryption (Chair: Shengli Liu)
10:30 - 10:55 Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems
Jaimee Brown, Juan Manuel Gonzalez-Nieto, Colin Boyd (QUT, Australia)
10:55 - 11:20 Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung (University of Tokyo, Japan), Jun Furukawa (NEC, Japan), Takeshi Gomi (University of Tokyo, Japan), Goichiro Hanaoka, Hideki Imai, Rui Zhang (AIST, Japan)
Key Exchange (Chair: Kefei Chen)
11:20 - 11:45 A Diffie-Hellman Key Exchange Protocol without Random Oracles
Ik Rae Jeong (ETRI, South Korea), Jeong Ok Kwon, Dong Hoon Lee (CIST, South Korea)
11:45 - 12:10 Authenticated Group Key Agreement for Multicast
Liming Wang, Chuan-Kun Wu (SKLOIS Lab, China)
12:10 - 12:35 Authenticated and Communication Efficient Group Key Agreement for Clustered Ad hoc Networks
Hongsong Shi (University of Electronic Science Technology of China, ChengDu, China), Mingxing He (Xihua University, Chengdu, China), Zhiguang Qin (University of Electronic Science Technology of China, ChengDu, China)
Lunch Break
Authentication/Signatures (Chair: Yvo Desmedt)
1:45 - 2:10 Efficient Mutual Data Authentication Using Manually Authenticated Strings
Sven Laur, Kaisa Nyberg (Helsinki University of Technology, Finland)
2:10 - 2:35 Achieving Multicast Stream Authentication using MDS Codes
Christophe Tartary, Huaxiong Wang (Macquarie University, Australia)
2:35 - 3:00 Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps
Zhou Sujing, Lin Dongdai (SKLOIS Lab, China)
Tea Break
Proxy-Signatures (Chair: David Pointcheval)
3:30 - 3:55 Security model of proxy-multi signature schemes
Feng Cao, Zhenfu Cao (Shanghai Jiao Tong University, China)
3:55 - 4:20 Efficient ID-based One-time Proxy Signature and Its Application in E-cheque
Rongxing Lu, Zhenfu Cao, Xiaolei Dong (Shanghai Jiao Tong University, China)
Cryptanalysis (Chair: Thomas Berson)
4:20 - 4:45 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Tae Hyun Kim (Korea University, Seoul, South Korea), Tsuyoshi Takagi (Future University-Hakodate, Japan), Dong-Guk Han, Ho Won Kim (ETRI, South Korea), Jongin Lim (Korea University, Seoul, South Korea)
4:45 - 5:10 Improved Collision Attack On Reduced Round Camellia
Guan Jie, Zhang Zhongya (Information Engineer University, Zhengzhou, China)
5:10 - 5:35 Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks
Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagorski (Wroclaw University of Technology)
6:00 - 8:00 Conference Banquet
Saturday December 9
09:00 - 10:00 Invited Speaker: Xiaoyun Wang (Tsinghua University, Beijin, China) - Chair: Yi Mu
Cryptanalysis on the stream cipher ABC v3
Tea Break
Implementation (Chair: Feng Bao)
10:30 - 10:55 Bitslice Implementation of AES
Chester Rebeiro, David Selvakumar, A.S.L. Devi (Centre For Development of Advanced Computing, Bangalore, India)
10:55 - 11:20 A fast algorithm for determining the linear complexity of periodic sequences over GF(3)
Jianqin Zhou, Qiang Zheng (Anhui Univ. of Technology, China)
Steganalysis and Watermarking (Chair: Weidong Qiu)
11:20 - 11:45 Steganalysis Based on Differential Statistics
Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan (Zhejiang University, China)
11:45 - 12:10 Watermarking Essential Data Structures for Copyright Protection
Qutaiba Albluwi, Ibrahim Kamel (University of Sharjah, UAE)
Lunch Break
1:15 - 5:30 Tour
6:30 - 8:30 Dinner
Sunday December 10
Boolean Functions and Stream Ciphers (Chair: Xuejia Lai)
9:00 - 9:25 A Note of Perfect Nonlinear Functions
Xiyong Zhang, Hua Guo, Jinjiang Yuan (Zhengzhou University, China)
9:25 - 9:50 Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing
Xiaomin Wang, Jiashu Zhang, Wenfang Zhang (Southwest Jiaotong University, Chengdu, China)
Tea Break
Intrusion Detection (Chair: Willy Susilo)
10:20 - 10:45 Cooperative Intrusion Detection for Web Applications
Nathalie Dagorn (University of Luxembourg)
10:45 - 11:10 Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis
Jianhua Yang (Bennett College), Byong Lee (Bennett College), Yongzhong Zhang (University of Shanghai for Science and Technology, China)
11:10 - 11:35 Smart Architecture for High-speed Intrusion Detection and Prevention Systems
Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang (National Tsing-Hua University, Taiwan)
11:35 - 12:00 A Multi-agent Cooperative Model and System for Integrated Security Monitoring
Xianxian Li, Lijun Liu, Jinpeng Huai (China)
Lunch Break
Disponibility/Reliability (Chair: Yi Mu)
1:30 - 1:55 Detecting DDoS Attacks based on Multi-stream Fused HMM in Source-end Network
Jian Kang, Yuan Zhang, Jiu-bin Ju (Jilin University, China)
1:55 - 2:20 An Immune-based Model for Service Survivability
Jinquan Zeng, Xiaojie Liu,Tao Li, Feixian Sun, Lingxi Peng, Caimin Liu (Sichuan University,China)
2:20 - 2:45 X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks
Lan Yu, Willy Susilo, Rei Safavi-Naini (University of Wollongong, Australia)
2:45 - 3:00 Closing Remarks