default search action
11. CANS 2012: Darmstadt, Germany
- Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis:
Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings. Springer 2012, ISBN 978-3-642-35403-8
Cryptanalysis
- Michael Lehmann, Willi Meier:
Conditional Differential Cryptanalysis of Grain-128a. 1-11 - Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu:
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. 12-22 - Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser:
A Simple Key-Recovery Attack on McOE-X. 23-31 - Jun Xu, Lei Hu, Siwei Sun, Ping Wang:
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. 32-42 - Mustafa Çoban, Ferhat Karakoç, Özkan Boztas:
Biclique Cryptanalysis of TWINE. 43-55 - Jorge Nakahara Jr.:
Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys). 56-71 - Yi Lu, Liping Ding, Yongji Wang:
Improved Linear Analysis on Block Cipher MULTI2. 72-85 - Orhun Kara, Ferhat Karakoç:
Fixed Points of Special Type and Cryptanalysis of Full GOST. 86-97
Network Security
- Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
Attacking Animated CAPTCHAs via Character Extraction. 98-113 - Orestis Tsigkas, Dimitrios Tzovaras:
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. 114-125 - Christian Szongott, Benjamin Henne, Matthew Smith:
Mobile Evil Twin Malnets - The Worst of Both Worlds. 126-141 - Omer Berkman, Benny Pinkas, Moti Yung:
Firm Grip Handshakes: A Tool for Bidirectional Vouching. 142-157
Cryptographic Protocols
- Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:
Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. 158-168 - Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. 169-184 - Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede:
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. 185-200 - Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa:
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. 201-217 - Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Fast and Private Computation of Cardinality of Set Intersection and Union. 218-231
Encryption
- Falko Strenzke:
Fast and Secure Root Finding for Code-Based Cryptosystems. 232-246 - Khaled Ouafi, Serge Vaudenay:
Strong Privacy for RFID Systems from Plaintext-Aware Encryption. 247-262 - Atsuko Miyaji, Yiren Mo:
How to Enhance the Security on the Least Significant Bit. 263-279
S-Box Theory
- Mansoor Ahmed Khan, Ferruh Özbudak:
Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions. 280-295 - Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores:
Some Representations of the S-Box of Camellia in GF(((22)2)2). 296-309
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.