Cryptology and Network Security

10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings

  • Dongdai Lin
  • Gene Tsudik
  • Xiaoyun Wang
Conference proceedings CANS 2011

DOI: 10.1007/978-3-642-25513-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7092)

Table of contents (20 papers)

  1. Front Matter
  2. Invited Talks

  3. Symmetric Cryptanalysis

    1. Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng
      Pages 15-25
    2. Leibo Li, Jiazhe Chen, Keting Jia
      Pages 26-39
    3. Chunfang Zhou, Xiutao Feng, Dongdai Lin
      Pages 40-53
  4. Symmetric Ciphers

    1. Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen
      Pages 76-97
  5. Public Key Cryptography

    1. Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao
      Pages 118-125
    2. Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
      Pages 126-137
  6. Protocol Attacks

    1. Jing Xu, Dengguo Feng
      Pages 160-171
    2. Shao-hui Wang, Wei-wei Zhang
      Pages 185-193
  7. Privacy Techniques

    1. Sébastien Canard, Roch Lescuyer, Jacques Traoré
      Pages 194-213
    2. Chun-I Fan, Ruei-Hau Hsu, Mark Manulis
      Pages 214-233
  8. Varia

    1. Yang-Wai Chow, Willy Susilo
      Pages 255-271
    2. Pengpian Wang, Dengguo Feng, Liwu Zhang
      Pages 272-291

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Keywords

CAPTCHA RFID encryption SAT-solving algebraic cryptanalysis lightweight cryptography

Editors and affiliations

  • Dongdai Lin
    • 1
  • Gene Tsudik
    • 2
  • Xiaoyun Wang
    • 3
  1. 1.The State Key Laboratory of Information Security, Institute of SoftwareChinese Academy of SciencesBeijingChina
  2. 2.Computer Science DepartmentUniversity of CaliforniaIrvineUSA
  3. 3.Shandong UniversityChina

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25512-0
  • Online ISBN 978-3-642-25513-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349