Search dblp for Publications

export results for "toc:db/conf/cans/cans2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cans/0002DW12,
  author       = {Yi Lu and
                  Liping Ding and
                  Yongji Wang},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Improved Linear Analysis on Block Cipher {MULTI2}},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {72--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_7},
  doi          = {10.1007/978-3-642-35404-5\_7},
  timestamp    = {Sat, 25 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/0002DW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BerkmanPY12,
  author       = {Omer Berkman and
                  Benny Pinkas and
                  Moti Yung},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Firm Grip Handshakes: {A} Tool for Bidirectional Vouching},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_12},
  doi          = {10.1007/978-3-642-35404-5\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/BerkmanPY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CobanKB12,
  author       = {Mustafa {\c{C}}oban and
                  Ferhat Karako{\c{c}} and
                  {\"{O}}zkan Boztas},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Biclique Cryptanalysis of {TWINE}},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {43--55},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_5},
  doi          = {10.1007/978-3-642-35404-5\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CobanKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CristofaroGT12,
  author       = {Emiliano De Cristofaro and
                  Paolo Gasti and
                  Gene Tsudik},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Fast and Private Computation of Cardinality of Set Intersection and
                  Union},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_17},
  doi          = {10.1007/978-3-642-35404-5\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CristofaroGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FujiokaSX12,
  author       = {Atsushi Fujioka and
                  Taiichi Saito and
                  Keita Xagawa},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Applicability of OR-Proof Techniques to Hierarchical Identity-Based
                  Identification},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_14},
  doi          = {10.1007/978-3-642-35404-5\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/FujiokaSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/GrozaMHV12,
  author       = {Bogdan Groza and
                  Pal{-}Stefan Murvay and
                  Anthony Van Herrewege and
                  Ingrid Verbauwhede},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {LiBrA-CAN: {A} Lightweight Broadcast Authentication Protocol for Controller
                  Area Networks},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {185--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_15},
  doi          = {10.1007/978-3-642-35404-5\_15},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/GrozaMHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KaraK12,
  author       = {Orhun Kara and
                  Ferhat Karako{\c{c}}},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Fixed Points of Special Type and Cryptanalysis of Full {GOST}},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {86--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_8},
  doi          = {10.1007/978-3-642-35404-5\_8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/KaraK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KhanO12,
  author       = {Mansoor Ahmed Khan and
                  Ferruh {\"{O}}zbudak},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean
                  Functions},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {280--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_21},
  doi          = {10.1007/978-3-642-35404-5\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KhanO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KolesnikovKS12,
  author       = {Vladimir Kolesnikov and
                  Ranjit Kumaresan and
                  Abdullatif Shikfa},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Efficient Verification of Input Consistency in Server-Assisted Secure
                  Function Evaluation},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_16},
  doi          = {10.1007/978-3-642-35404-5\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/KolesnikovKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LehmannM12,
  author       = {Michael Lehmann and
                  Willi Meier},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Conditional Differential Cryptanalysis of Grain-128a},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_1},
  doi          = {10.1007/978-3-642-35404-5\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LehmannM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Martinez-HerreraMN12,
  author       = {Alberto F. Mart{\'{\i}}nez{-}Herrera and
                  J. Carlos Mex{-}Perera and
                  Juan Arturo Nolazco{-}Flores},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Some Representations of the S-Box of Camellia in \emph{GF}(((2\({}^{\mbox{2}}\))\({}^{\mbox{2}}\))\({}^{\mbox{2}}\))},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_22},
  doi          = {10.1007/978-3-642-35404-5\_22},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Martinez-HerreraMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MendelMRT12,
  author       = {Florian Mendel and
                  Bart Mennink and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {A Simple Key-Recovery Attack on McOE-X},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {23--31},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_3},
  doi          = {10.1007/978-3-642-35404-5\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/MendelMRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MiyajiM12,
  author       = {Atsuko Miyaji and
                  Yiren Mo},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {How to Enhance the Security on the Least Significant Bit},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {263--279},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_20},
  doi          = {10.1007/978-3-642-35404-5\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/MiyajiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Nakahara12,
  author       = {Jorge Nakahara Jr.},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Differential and Linear Attacks on the Full WIDEA-\emph{n} Block Ciphers
                  (under Weak Keys)},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {56--71},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_6},
  doi          = {10.1007/978-3-642-35404-5\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Nakahara12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NeupaneSC12,
  author       = {Kashi Neupane and
                  Rainer Steinwandt and
                  Adriana Su{\'{a}}rez Corona},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Group Key Establishment: Adding Perfect Forward Secrecy at the Cost
                  of One Round},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {158--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_13},
  doi          = {10.1007/978-3-642-35404-5\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NeupaneSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NguyenCS12,
  author       = {Vu Duc Nguyen and
                  Yang{-}Wai Chow and
                  Willy Susilo},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Attacking Animated CAPTCHAs via Character Extraction},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_9},
  doi          = {10.1007/978-3-642-35404-5\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NguyenCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/OuafiV12,
  author       = {Khaled Ouafi and
                  Serge Vaudenay},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Strong Privacy for {RFID} Systems from Plaintext-Aware Encryption},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {247--262},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_19},
  doi          = {10.1007/978-3-642-35404-5\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/OuafiV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ShiFFW12,
  author       = {Zhenqing Shi and
                  Xiutao Feng and
                  Dengguo Feng and
                  Chuankun Wu},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {A Real-Time Key Recovery Attack on the Lightweight Stream Cipher {A2U2}},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {12--22},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_2},
  doi          = {10.1007/978-3-642-35404-5\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ShiFFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Strenzke12,
  author       = {Falko Strenzke},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Fast and Secure Root Finding for Code-Based Cryptosystems},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_18},
  doi          = {10.1007/978-3-642-35404-5\_18},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Strenzke12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SzongottHS12,
  author       = {Christian Szongott and
                  Benjamin Henne and
                  Matthew Smith},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Mobile Evil Twin Malnets - The Worst of Both Worlds},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_11},
  doi          = {10.1007/978-3-642-35404-5\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SzongottHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TsigkasT12,
  author       = {Orestis Tsigkas and
                  Dimitrios Tzovaras},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in
                  \emph{k}-Partite Graphs},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {114--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_10},
  doi          = {10.1007/978-3-642-35404-5\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/TsigkasT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/XuHSW12,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun and
                  Ping Wang},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_4},
  doi          = {10.1007/978-3-642-35404-5\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/XuHSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2012,
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5},
  doi          = {10.1007/978-3-642-35404-5},
  isbn         = {978-3-642-35403-8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}