


default search action
9. CANS 2010: Kuala Lumpur, Malaysia
- Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi:

Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6467, Springer 2010, ISBN 978-3-642-17618-0
Block Ciphers
- Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay:

Cryptanalysis of Reduced-Round MIBS Block Cipher. 1-19 - Chenghang Du, Jiazhe Chen

:
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. 20-30 - Chang N. Zhang, Qian Yu, Xiao Wei Liu:

An Algorithm Based Concurrent Error Detection Scheme for AES. 31-42
Invited Talk I
- Kaoru Kurosawa:

Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). 43
Wireless Network Security
- Johann Großschädl, Ilya Kizhvatov:

Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. 44-61 - Martin Eian:

A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. 62-75 - Günther Lackner, Peter Teufl, Roman Weinberger:

User Tracking Based on Behavioral Fingerprints. 76-95
Hash Functions
- Nasour Bagheri

, Praveen Gauravaram
, Majid Naderi, Søren S. Thomsen:
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. 96-105 - Marine Minier, Raphael C.-W. Phan

, Benjamin Pousse:
Integral Distinguishers of Some SHA-3 Candidates. 106-123 - Bozhan Su, Wenling Wu, Shuang Wu, Le Dong:

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. 124-139
Public Key Cryptography
- Johannes Buchmann, Stanislav Bulygin, Jintai Ding

, Wael Said Abd Elmageed Mohamed
, Fabian Werner:
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. 140-155 - Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani:

Generating Parameters for Algebraic Torus-Based Cryptosystems. 156-168 - Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski:

Analysis of the MQQ Public Key Cryptosystem. 169-183 - Roghaie Mahdavi, Abolghasem Saiadian:

Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations. 184-198
Invited Talk II
- Ahmad-Reza Sadeghi:

Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). 199-200
Secure Mechanisms
- Tsz Hon Yuen

, Willy Susilo
, Yi Mu:
Towards a Cryptographic Treatment of Publish/Subscribe Systems. 201-220 - Willy Susilo

, Yang-Wai Chow
, Hua-Yu Zhou:
STE3D-CAP: Stereoscopic 3D CAPTCHA. 221-240 - Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu:

TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism. 241-260
Cryptographic Protocols
- Guomin Yang

, Chik How Tan:
Dynamic Group Key Exchange Revisited. 261-277 - Roberto Araújo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi

:
Towards Practical and Secure Coercion-Resistant Electronic Elections. 278-297
Anonymous Credentials
- Carlo Blundo

, Vincenzo Iovino
, Giuseppe Persiano:
Predicate Encryption with Partial Public Keys. 298-313 - Jorge Guajardo, Bart Mennink, Berry Schoenmakers:

Anonymous Credential Schemes with Encrypted Attributes. 314-333 - Aymen Abed, Sébastien Canard:

One Time Anonymous Certificate: X.509 Supporting Anonymity. 334-353

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














