default search action
7. CANS 2008: Hong-Kong, China
- Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong:
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings. Lecture Notes in Computer Science 5339, Springer 2008, ISBN 978-3-540-89640-1
Cryptosystems
- Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. 1-17 - Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan:
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. 18-30 - Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda:
Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. 31-48 - Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, Huaxiong Wang:
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. 49-63
Signatures
- Raylin Tso, Xun Yi, Xinyi Huang:
Efficient and Short Certificateless Signature. 64-79 - Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu:
Sanitizable Signatures Revisited. 80-97 - Marc Joye:
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles. 98-107 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. 108-119
Identification, Authentication and Key Management
- David Galindo, Rodrigo Roman, Javier López:
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. 120-132 - Michel Abdalla, Malika Izabachène, David Pointcheval:
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. 133-148 - Julien Bringer, Hervé Chabanne, Thomas Icart:
Cryptanalysis of EC-RAC, a RFID Identification Protocol. 149-161
Cryptographic Algorithms and Protocols
- Youming Qiao, Christophe Tartary:
Counting Method for Multi-party Computation over Non-abelian Groups. 162-177 - Peishun Wang, Huaxiong Wang, Josef Pieprzyk:
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. 178-195 - Tiancheng Lou, Christophe Tartary:
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. 196-213 - Huafei Zhu:
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. 214-225 - Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Katou, Yoshitaka Morikawa:
Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. 226-239
Stream Ciphers and Block Ciphers
- Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi:
Cryptanalysis of MV3 Stream Cipher. 240-251 - Jorge Nakahara Jr.:
3D: A Three-Dimensional Block Cipher. 252-267
Cryptographic Foundations
- Chao Li, Shaojing Fu, Bing Sun:
Construction of Resilient Functions with Multiple Cryptographic Criteria. 268-277 - Shaojing Fu, Chao Li, Bing Sun:
Enumeration of Homogeneous Rotation Symmetric Functions over Fp. 278-284 - Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan:
Unconditionally Reliable Message Transmission in Directed Hypergraphs. 285-303
Applications and Implementations
- Yu Zhang:
An Open Framework for Remote Electronic Elections. 304-316 - Bogdan Carbunar, Mahesh V. Tripunitara:
Conditional Payments for Computing Markets. 317-331 - Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru:
High-Speed Search System for PGP Passphrases. 332-348 - Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger:
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. 349-365
Security in Ad Hoc Networks and Wireless Sensor Networks
- Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Authenticated Directed Diffusion. 366-377 - Atefeh Mashatan, Douglas R. Stinson:
A New Message Recognition Protocol for Ad Hoc Pervasive Networks. 378-394
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.