ACNS 2008 Accepted Papers

An authentication scheme based on the twisted conjugacy problem
Vladimir Shpilrain and Alexander Ushakov
The City College of New York and Stevens Institute of Technology
Attacking Reduced Round SHA-256
Somitra Kumar Sanadhya and Palash Sarkar
Indian Statistical Institute, Kolkata, India
Generic Constructions of Stateful Public Key Encryption and Their Applications
Joonsang Baek and Jianying Zhou and Feng Bao
Institute for Infocomm Research, Singapore
Improved Conditional E-Payments
Marina Blanton
University of Notre Dame
On the Effectiveness of Internal Patch Dissemination against File-sharing Worms
Liang Xie and Hui Song and Sencun Zhu
Pennsylvania State University
Replay Attack in a Fair Exchange Protocol
Macią Mut-Puigserver and Magdalena Payeras-Capellą and Josep Lluķs
Ferrer-Gomila and Llorenē Huguet-Rotger Universitat de les Illes Balears
Traceable and Retrievable Identity-based Encryption
Man Ho Au (1) and Qiong Huang (2) and Joseph K. Liu (3) and Willy Susilo (1) and Duncan S. Wong (2) and Guomin Yang (2)
1) University of Wollongong and 2) City University of Hong Kong and 3) Institute for Infocomm Research, Singapore
PPAA: Peer-to-Peer Anonymous Authentication
Patrick P. Tsang and Sean W. Smith
Department of Computer Science, Dartmouth College
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation
Tong-Lee Lim and A. Lakshminarayanan and Vira Saksen
Institute for Infocomm Research, Singapore
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Jin Li and Kwangjo Kim and Fangguo Zhang and Duncan Wong
International Research center for Information Security (IRIS), Information and Communications University(ICU), Korea; Department of Electronics and Communication Engineering, Sun Yat-Sen University, China; Department of Computer Science, City University of Hong Kong, Hong Kong, China
New Differential Attacks on Rainbow-like Multivariate Signature and Improved Designs
Jintai Ding and Bo-Yin Yang
University Cincinnati and Academia Sinica
Trapdoor Sanitizable Signatures and their Application to Content Protection
Sebastien Canard and Fabien Laguillaumie and Michel Milhau
Orange Labs R&D and Universite de Caen and Orange Labs R&D
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Frank Stajano and Dan Cvrcek and Matt Lewis
Computer Laboratory, University of Cambridge
Dakota -- hashing from a combination of modular arithmetic and symmetric cryptography
Ivan B. Damg{\aa}rd and Lars R. Knudsen and S{\o}ren S. Thomsen
Anonymity in Transferable E-cash
Sebastien Canard and Aline Gouget
Orange Labs R&D and Gemalto Contact
Traceable Privacy of Recent RFID Authentication Protocols
Khaled Ouafi and Raphael C.-W. Phan
EPFL and Loughborough University
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Takashi Nishide and Kazuki Yoneyama and Kazuo Ohta
The University of Electro-Communications, Hitachisoft
wNAF*, an efficient left-to-right signed digit recoding algorithm
Brian King
Indiana University - Purdue University Indianapolis
Efficient Device Pairing using ``Human-Comparable'' Synchronized Audiovisual Patterns
Ramnath Prasad and Nitesh Saxena
Polytechnic University
A Very Compact "Perfectly Masked" S-Box for AES
D. Canright and Lejla Batina
Naval Postgraduate School, USA and K.U. Leuven ESAT/COSIC, Belgium
Multi-Factor Authenticated Key Exchange
David Pointcheval and Sebastien Zimmer
ENS/CNRS/INRIA, Paris, France
Peeking Through The Cloud
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis and Niels Provos
Johns Hopkins University and Google Inc.
Getting the Best Out of Existing Hash Functions or What if We Are Stuck with SHA?
Yevgeniy Dodis and Prashant Puniya
NYU
Pushback for Overlay Networks: Protecting against Malicious Insiders
Angelos Stavrou, Michael E. Locasto and Angelos D. Keromytis
George Mason University, Dartmouth College and Columbia University
Repelling Detour Attack against Onions with Re-Encryption
Marek Klonowski and Miroslaw Kutylowski and Anna Lauks
Institute of Mathematics and Computer Science, Wroclaw University of Technology
Analysis of EAP-GPSK Authentication Protocol
John C. Mitchell and Arnab Roy and Paul Rowe and Andre Scedrov
Stanford University and University of Pennsylvania
On the Security of the CCM Encryption Mode and of a Slight Variant
Pierre-Alain Fouque Gwenaėlle Martinet, Frederic Valette and Sebastien Zimmer
ENS, DCSSI, CELAR, France
PUF-HB: A Tamper-Resilient HB based Authentication Protocol
Ghaith Hammouri and Berk Sunar
Worcester Polytechnic Institute
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Nikita Borisov and Soumyadeb Mitra
University of Illinois at Urbana-Champaign and Data Domain
The security of EPC Gen2 compliant RFID protocols
Mike Burmester and Breno deMedeiros
Florida State University and Google Inc.