Cryptology and Network Security

11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

Editors:

ISBN: 978-3-642-35403-8 (Print) 978-3-642-35404-5 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis

    1. No Access

      Book Chapter

      Pages 1-11

      Conditional Differential Cryptanalysis of Grain-128a

    2. No Access

      Book Chapter

      Pages 12-22

      A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2

    3. No Access

      Book Chapter

      Pages 23-31

      A Simple Key-Recovery Attack on McOE-X

    4. No Access

      Book Chapter

      Pages 32-42

      Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem

    5. No Access

      Book Chapter

      Pages 43-55

      Biclique Cryptanalysis of TWINE

    6. No Access

      Book Chapter

      Pages 56-71

      Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)

    7. No Access

      Book Chapter

      Pages 72-85

      Improved Linear Analysis on Block Cipher MULTI2

    8. No Access

      Book Chapter

      Pages 86-97

      Fixed Points of Special Type and Cryptanalysis of Full GOST

  3. Network Security

    1. No Access

      Book Chapter

      Pages 98-113

      Attacking Animated CAPTCHAs via Character Extraction

    2. No Access

      Book Chapter

      Pages 114-125

      Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs

    3. No Access

      Book Chapter

      Pages 126-141

      Mobile Evil Twin Malnets – The Worst of Both Worlds

    4. No Access

      Book Chapter

      Pages 142-157

      Firm Grip Handshakes: A Tool for Bidirectional Vouching

  4. Cryptographic Protocols

    1. No Access

      Book Chapter

      Pages 158-168

      Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round

    2. No Access

      Book Chapter

      Pages 169-184

      Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification

    3. No Access

      Book Chapter

      Pages 185-200

      LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks

    4. No Access

      Book Chapter

      Pages 201-217

      Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation

    5. No Access

      Book Chapter

      Pages 218-231

      Fast and Private Computation of Cardinality of Set Intersection and Union

  5. Encryption

    1. No Access

      Book Chapter

      Pages 232-246

      Fast and Secure Root Finding for Code-Based Cryptosystems

    2. No Access

      Book Chapter

      Pages 247-262

      Strong Privacy for RFID Systems from Plaintext-Aware Encryption

    3. No Access

      Book Chapter

      Pages 263-279

      How to Enhance the Security on the Least Significant Bit

previous Page of 2