default search action
9. CANS 2010: Kuala Lumpur, Malaysia
- Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi:
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6467, Springer 2010, ISBN 978-3-642-17618-0
Block Ciphers
- Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay:
Cryptanalysis of Reduced-Round MIBS Block Cipher. 1-19 - Chenghang Du, Jiazhe Chen:
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. 20-30 - Chang N. Zhang, Qian Yu, Xiao Wei Liu:
An Algorithm Based Concurrent Error Detection Scheme for AES. 31-42
Invited Talk I
- Kaoru Kurosawa:
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). 43
Wireless Network Security
- Johann Großschädl, Ilya Kizhvatov:
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. 44-61 - Martin Eian:
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. 62-75 - Günther Lackner, Peter Teufl, Roman Weinberger:
User Tracking Based on Behavioral Fingerprints. 76-95
Hash Functions
- Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen:
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. 96-105 - Marine Minier, Raphael C.-W. Phan, Benjamin Pousse:
Integral Distinguishers of Some SHA-3 Candidates. 106-123 - Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. 124-139
Public Key Cryptography
- Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner:
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. 140-155 - Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani:
Generating Parameters for Algebraic Torus-Based Cryptosystems. 156-168 - Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski:
Analysis of the MQQ Public Key Cryptosystem. 169-183 - Roghaie Mahdavi, Abolghasem Saiadian:
Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations. 184-198
Invited Talk II
- Ahmad-Reza Sadeghi:
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). 199-200
Secure Mechanisms
- Tsz Hon Yuen, Willy Susilo, Yi Mu:
Towards a Cryptographic Treatment of Publish/Subscribe Systems. 201-220 - Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou:
STE3D-CAP: Stereoscopic 3D CAPTCHA. 221-240 - Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu:
TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism. 241-260
Cryptographic Protocols
- Guomin Yang, Chik How Tan:
Dynamic Group Key Exchange Revisited. 261-277 - Roberto Araújo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi:
Towards Practical and Secure Coercion-Resistant Electronic Elections. 278-297
Anonymous Credentials
- Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano:
Predicate Encryption with Partial Public Keys. 298-313 - Jorge Guajardo, Bart Mennink, Berry Schoenmakers:
Anonymous Credential Schemes with Encrypted Attributes. 314-333 - Aymen Abed, Sébastien Canard:
One Time Anonymous Certificate: X.509 Supporting Anonymity. 334-353
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.