Cryptology and Network Security

11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

  • Josef Pieprzyk
  • Ahmad-Reza Sadeghi
  • Mark Manulis
Conference proceedings CANS 2012

DOI: 10.1007/978-3-642-35404-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7712)

Table of contents (22 papers)

  1. Front Matter
  2. Cryptanalysis

    1. Conditional Differential Cryptanalysis of Grain-128a
      Michael Lehmann, Willi Meier
      Pages 1-11
    2. A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
      Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
      Pages 12-22
    3. A Simple Key-Recovery Attack on McOE-X
      Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
      Pages 23-31
    4. Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
      Jun Xu, Lei Hu, Siwei Sun, Ping Wang
      Pages 32-42
    5. Biclique Cryptanalysis of TWINE
      Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
      Pages 43-55
    6. Improved Linear Analysis on Block Cipher MULTI2
      Yi Lu, Liping Ding, Yongji Wang
      Pages 72-85
    7. Fixed Points of Special Type and Cryptanalysis of Full GOST
      Orhun Kara, Ferhat Karakoç
      Pages 86-97
  3. Network Security

    1. Attacking Animated CAPTCHAs via Character Extraction
      Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
      Pages 98-113
    2. Mobile Evil Twin Malnets – The Worst of Both Worlds
      Christian Szongott, Benjamin Henne, Matthew Smith
      Pages 126-141
    3. Firm Grip Handshakes: A Tool for Bidirectional Vouching
      Omer Berkman, Benny Pinkas, Moti Yung
      Pages 142-157
  4. Cryptographic Protocols

    1. Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
      Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
      Pages 158-168
    2. Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
      Atsushi Fujioka, Taiichi Saito, Keita Xagawa
      Pages 169-184
    3. LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
      Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
      Pages 185-200
    4. Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
      Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
      Pages 201-217
    5. Fast and Private Computation of Cardinality of Set Intersection and Union
      Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
      Pages 218-231
  5. Encryption

About these proceedings


This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.


authenticated encryption code-based cryptography forward secrecy s-box timing attack

Editors and affiliations

  • Josef Pieprzyk
    • 1
  • Ahmad-Reza Sadeghi
    • 2
  • Mark Manulis
    • 3
  1. 1.Department of ComputingMacquarie UniversitySydneyAustralia
  2. 2.System Security Lab.Technische Universität DarmstadtDarmstadtGermany
  3. 3.Department of ComputingUniversity of SurreyGuildfordUK

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-35403-8
  • Online ISBN 978-3-642-35404-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349