default search action
10. CANS 2011: Sanya, China
- Dongdai Lin, Gene Tsudik, Xiaoyun Wang:
Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings. Lecture Notes in Computer Science 7092, Springer 2011, ISBN 978-3-642-25512-0
Invited Talks
- Xavier Boyen:
Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture). 1-12 - Phong Q. Nguyen:
Breaking Fully-Homomorphic-Encryption Challenges. 13-14
Symmetric Cryptanalysis
- Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:
Cube Cryptanalysis of Hitag2 Stream Cipher. 15-25 - Leibo Li, Jiazhe Chen, Keting Jia:
New Impossible Differential Cryptanalysis of Reduced-Round Camellia. 26-39 - Chunfang Zhou, Xiutao Feng, Dongdai Lin:
The Initialization Stage Analysis of ZUC v1.5. 40-53 - Stanislav Bulygin, Johannes Buchmann:
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. 54-75
Symmetric Ciphers
- Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen:
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. 76-97 - Shingo Yanagihara, Tetsu Iwata:
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. 98-117
Public Key Cryptography
- Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao:
Security Analysis of an Improved MFE Public Key Cryptosystem. 118-125 - Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. 126-137 - Tatsuaki Okamoto, Katsuyuki Takashima:
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. 138-159
Protocol Attacks
- Jing Xu, Dengguo Feng:
Comments on the SM2 Key Exchange Protocol. 160-171 - Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng:
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. 172-184 - Shaohui Wang, Weiwei Zhang:
Passive Attack on RFID LMAP++ Authentication Protocol. 185-193
Privacy Techniques
- Sébastien Canard, Roch Lescuyer, Jacques Traoré:
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. 194-213 - Chun-I Fan, Ruei-Hau Hsu, Mark Manulis:
Group Signature with Constant Revocation Costs for Signers and Verifiers. 214-233 - Payman Mohassel:
Fast Computation on Encrypted Polynomials and Applications. 234-254
Varia
- Yang-Wai Chow, Willy Susilo:
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. 255-271 - Pengpian Wang, Dengguo Feng, Liwu Zhang:
Towards Attribute Revocation in Key-Policy Attribute Based Encryption. 272-291 - Ning Ding, Dawu Gu:
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge. 292-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.