Cryptology and Network Security

11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

  • Josef Pieprzyk
  • Ahmad-Reza Sadeghi
  • Mark Manulis
Conference proceedings CANS 2012

DOI: 10.1007/978-3-642-35404-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7712)

Table of contents

  1. Front Matter
  2. Cryptanalysis

    1. Michael Lehmann, Willi Meier
      Pages 1-11
    2. Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
      Pages 12-22
    3. Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
      Pages 23-31
    4. Jun Xu, Lei Hu, Siwei Sun, Ping Wang
      Pages 32-42
    5. Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
      Pages 43-55
    6. Yi Lu, Liping Ding, Yongji Wang
      Pages 72-85
    7. Orhun Kara, Ferhat Karakoç
      Pages 86-97
  3. Network Security

    1. Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 98-113
    2. Christian Szongott, Benjamin Henne, Matthew Smith
      Pages 126-141
    3. Omer Berkman, Benny Pinkas, Moti Yung
      Pages 142-157
  4. Cryptographic Protocols

    1. Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
      Pages 158-168
    2. Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 169-184
    3. Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
      Pages 185-200
    4. Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
      Pages 201-217
    5. Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
      Pages 218-231
  5. Encryption

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.

Keywords

authenticated encryption code-based cryptography forward secrecy s-box timing attack

Editors and affiliations

  • Josef Pieprzyk
    • 1
  • Ahmad-Reza Sadeghi
    • 2
  • Mark Manulis
    • 3
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia
  2. 2.System Security Lab.Technische Universität DarmstadtDarmstadtGermany
  3. 3.Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35403-8
  • Online ISBN 978-3-642-35404-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349