


default search action
10. CANS 2011: Sanya, China
- Dongdai Lin, Gene Tsudik, Xiaoyun Wang:

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings. Lecture Notes in Computer Science 7092, Springer 2011, ISBN 978-3-642-25512-0
Invited Talks
- Xavier Boyen:

Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture). 1-12 - Phong Q. Nguyen:

Breaking Fully-Homomorphic-Encryption Challenges. 13-14
Symmetric Cryptanalysis
- Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng:

Cube Cryptanalysis of Hitag2 Stream Cipher. 15-25 - Leibo Li, Jiazhe Chen

, Keting Jia:
New Impossible Differential Cryptanalysis of Reduced-Round Camellia. 26-39 - Chunfang Zhou, Xiutao Feng, Dongdai Lin:

The Initialization Stage Analysis of ZUC v1.5. 40-53 - Stanislav Bulygin, Johannes Buchmann:

Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. 54-75
Symmetric Ciphers
- Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen:

EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. 76-97 - Shingo Yanagihara, Tetsu Iwata:

On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. 98-117
Public Key Cryptography
- Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao:

Security Analysis of an Improved MFE Public Key Cryptosystem. 118-125 - Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:

A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. 126-137 - Tatsuaki Okamoto, Katsuyuki Takashima:

Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. 138-159
Protocol Attacks
- Jing Xu, Dengguo Feng:

Comments on the SM2 Key Exchange Protocol. 160-171 - Wei-Chuen Yau, Raphael C.-W. Phan

, Bok-Min Goi
, Swee-Huay Heng
:
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. 172-184 - Shaohui Wang, Weiwei Zhang:

Passive Attack on RFID LMAP++ Authentication Protocol. 185-193
Privacy Techniques
- Sébastien Canard, Roch Lescuyer, Jacques Traoré:

Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. 194-213 - Chun-I Fan, Ruei-Hau Hsu, Mark Manulis

:
Group Signature with Constant Revocation Costs for Signers and Verifiers. 214-233 - Payman Mohassel:

Fast Computation on Encrypted Polynomials and Applications. 234-254
Varia
- Yang-Wai Chow

, Willy Susilo
:
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. 255-271 - Pengpian Wang, Dengguo Feng, Liwu Zhang:

Towards Attribute Revocation in Key-Policy Attribute Based Encryption. 272-291 - Ning Ding, Dawu Gu:

A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge. 292-311

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














