


default search action
11. CANS 2012: Darmstadt, Germany
- Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis:

Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings. Springer 2012, ISBN 978-3-642-35403-8
Cryptanalysis
- Michael Lehmann, Willi Meier:

Conditional Differential Cryptanalysis of Grain-128a. 1-11 - Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu:

A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. 12-22 - Florian Mendel

, Bart Mennink, Vincent Rijmen
, Elmar Tischhauser:
A Simple Key-Recovery Attack on McOE-X. 23-31 - Jun Xu, Lei Hu, Siwei Sun

, Ping Wang:
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. 32-42 - Mustafa Çoban, Ferhat Karakoç, Özkan Boztas:

Biclique Cryptanalysis of TWINE. 43-55 - Jorge Nakahara Jr.:

Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys). 56-71 - Yi Lu, Liping Ding, Yongji Wang:

Improved Linear Analysis on Block Cipher MULTI2. 72-85 - Orhun Kara

, Ferhat Karakoç:
Fixed Points of Special Type and Cryptanalysis of Full GOST. 86-97
Network Security
- Vu Duc Nguyen, Yang-Wai Chow

, Willy Susilo
:
Attacking Animated CAPTCHAs via Character Extraction. 98-113 - Orestis Tsigkas, Dimitrios Tzovaras

:
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. 114-125 - Christian Szongott, Benjamin Henne, Matthew Smith:

Mobile Evil Twin Malnets - The Worst of Both Worlds. 126-141 - Omer Berkman, Benny Pinkas, Moti Yung:

Firm Grip Handshakes: A Tool for Bidirectional Vouching. 142-157
Cryptographic Protocols
- Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:

Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. 158-168 - Atsushi Fujioka, Taiichi Saito, Keita Xagawa

:
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. 169-184 - Bogdan Groza

, Pal-Stefan Murvay
, Anthony Van Herrewege, Ingrid Verbauwhede
:
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. 185-200 - Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa

:
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. 201-217 - Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:

Fast and Private Computation of Cardinality of Set Intersection and Union. 218-231
Encryption
- Falko Strenzke

:
Fast and Secure Root Finding for Code-Based Cryptosystems. 232-246 - Khaled Ouafi, Serge Vaudenay:

Strong Privacy for RFID Systems from Plaintext-Aware Encryption. 247-262 - Atsuko Miyaji

, Yiren Mo:
How to Enhance the Security on the Least Significant Bit. 263-279
S-Box Theory
- Mansoor Ahmed Khan

, Ferruh Özbudak
:
Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions. 280-295 - Alberto F. Martínez-Herrera, J. Carlos Mex-Perera

, Juan Arturo Nolazco-Flores
:
Some Representations of the S-Box of Camellia in GF(((22)2)2). 296-309

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














