The Resource Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
Resource Information
The item Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques
- Language
- eng
- Extent
- 1 online resource (xii, 311 pages).
- Contents
-
- Intro; Title; Preface; Table of Contents; Invited Talks; Expressive Encryption Systems from Lattices; Introduction; Background; Lattice Notions; Discrete Gaussians; Sampling and Preimage Sampling; Hardness Assumption; Classic Constructions; Regev Public-Key Encryption; GPV Identity-Based Encryption; Techniques and Refinements; Bit-by-Bit Standard-Model IBE; All-at-Once Standard-Model IBE; Adaptive or F̀̀ull'' Security; Delegation and Hierarchies; Concatenation-Based Delegation; Multiplicative In-Place Delegation; Attributes and Predicates; Conclusion; References
- Breaking Fully-Homomorphic-Encryption ChallengesReferences; Symmetric Cryptanalysis; Cube Cryptanalysis of Hitag2 Stream Cipher; Introduction; Hitag2 Stream Cipher; Cube Attack; Cube Attack on Hitag2; First Phase: Black-Box Attack; Second Phase: White-Box Attack; Third Phase: Exhaustive Search Attack; Experimental Results; Conclusion; References; New Impossible Differential Cryptanalysis of Reduced-Round Camellia; Introduction; Preliminaries; Notations; A Brief Description of Camellia; 7-Round Impossible Differential of Camellia; Impossible Differential Attack on 10-Round Camellia-128
- Attack on 10-Round Camellia-192 and 11-Round Camellia-256Attack on 10-Round Camellia-192; Attack on 11-Round Camellia-256; Conclusion; References; The Initialization Stage Analysis of ZUC v1.5; Introduction; Preliminaries; ZUC v1.5; S-Functions; The Chosen-IV Attack of ZUC v1.5; The Definition of Differences; An Chosen-IV Differential Path of ZUC v1.5; The Differential Properties of Operations in ZUC v1.5; The Probability of the Differential; Conclusion; References; Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48; Introduction; PRINTCipher
- Algebraic DescriptionSAT Techniques for Algebraic System Solving; Conversion Techniques; Optimal Tools and Strategies for the Attacks; Algebraic Analysis of PRINTCipher-48; Attack on Round-Reduced PRINTCipher-48; Additional Bits at Round Four; Side Channel Analysis of the Full PRINTCipher-48; Conclusion and Future Work; References; Symmetric Ciphers; EPCBC -- A Block Cipher Suitable for Electronic Product Code Encryption; Introduction; The Electronic Product Code -- EPC; A New Block Cipher Suitable for EPC Encryption: EPCBC; EPCBC(48,96) -- EPCBC with 48-Bit Block Size and 96-Bit Key Size
- EPCBC(96,96) -- EPCBC with 96-Bit Block Size and 96-Bit Key SizeImproved Differential and Linear Cryptanalyis of PR-n; Brief Description of PR-n; Improved Differential and Linear Cryptanalysis; Security Analysis of EPCBC; Differential, Linear and Related-Key Differential Cryptanalysis; Other Attacks on EPCBC; Implementation of EPCBC; Conclusion; References; On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures; Introduction; Preliminaries; Generalized Feistel Structure (GFS); Diffusion of GFS; Equivalence of GFSs; Analysis on DRmax(); Type 1 GFS
- Isbn
- 9783642255137
- Label
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings
- Title
- Cryptology and network security
- Title remainder
- 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings
- Statement of responsibility
- Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
- Title variation
- CANS 2011
- Subject
-
- Coding theory
- Computational complexity
- Computer Communication Networks
- Computer Science
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer science
- Conference papers and proceedings
- Conference papers and proceedings
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Data protection
- Data structures (Computer science)
- Engineering & Applied Sciences
- Informatique
- Systems and Data Security
- Coding and Information Theory
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques
- Cataloging source
- GW5XE
- Dewey number
- 005.8/2
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I58 2011
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2011
- http://bibfra.me/vocab/lite/meetingName
- International Conference on Cryptology and Network Security
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1966-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Lin, Dongdai
- Tsudik, G.
- Wang, Xiaoyun
- Series statement
-
- Lecture notes in computer science,
- LNCS sublibrary. SL 4, Security and cryptology
- Series volume
- 7092
- http://library.link/vocab/subjectName
-
- Data encryption (Computer science)
- Computer networks
- Informatique
- Computer networks
- Data encryption (Computer science)
- Engineering & Applied Sciences
- Computer Science
- Label
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Title; Preface; Table of Contents; Invited Talks; Expressive Encryption Systems from Lattices; Introduction; Background; Lattice Notions; Discrete Gaussians; Sampling and Preimage Sampling; Hardness Assumption; Classic Constructions; Regev Public-Key Encryption; GPV Identity-Based Encryption; Techniques and Refinements; Bit-by-Bit Standard-Model IBE; All-at-Once Standard-Model IBE; Adaptive or F̀̀ull'' Security; Delegation and Hierarchies; Concatenation-Based Delegation; Multiplicative In-Place Delegation; Attributes and Predicates; Conclusion; References
- Breaking Fully-Homomorphic-Encryption ChallengesReferences; Symmetric Cryptanalysis; Cube Cryptanalysis of Hitag2 Stream Cipher; Introduction; Hitag2 Stream Cipher; Cube Attack; Cube Attack on Hitag2; First Phase: Black-Box Attack; Second Phase: White-Box Attack; Third Phase: Exhaustive Search Attack; Experimental Results; Conclusion; References; New Impossible Differential Cryptanalysis of Reduced-Round Camellia; Introduction; Preliminaries; Notations; A Brief Description of Camellia; 7-Round Impossible Differential of Camellia; Impossible Differential Attack on 10-Round Camellia-128
- Attack on 10-Round Camellia-192 and 11-Round Camellia-256Attack on 10-Round Camellia-192; Attack on 11-Round Camellia-256; Conclusion; References; The Initialization Stage Analysis of ZUC v1.5; Introduction; Preliminaries; ZUC v1.5; S-Functions; The Chosen-IV Attack of ZUC v1.5; The Definition of Differences; An Chosen-IV Differential Path of ZUC v1.5; The Differential Properties of Operations in ZUC v1.5; The Probability of the Differential; Conclusion; References; Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48; Introduction; PRINTCipher
- Algebraic DescriptionSAT Techniques for Algebraic System Solving; Conversion Techniques; Optimal Tools and Strategies for the Attacks; Algebraic Analysis of PRINTCipher-48; Attack on Round-Reduced PRINTCipher-48; Additional Bits at Round Four; Side Channel Analysis of the Full PRINTCipher-48; Conclusion and Future Work; References; Symmetric Ciphers; EPCBC -- A Block Cipher Suitable for Electronic Product Code Encryption; Introduction; The Electronic Product Code -- EPC; A New Block Cipher Suitable for EPC Encryption: EPCBC; EPCBC(48,96) -- EPCBC with 48-Bit Block Size and 96-Bit Key Size
- EPCBC(96,96) -- EPCBC with 96-Bit Block Size and 96-Bit Key SizeImproved Differential and Linear Cryptanalyis of PR-n; Brief Description of PR-n; Improved Differential and Linear Cryptanalysis; Security Analysis of EPCBC; Differential, Linear and Related-Key Differential Cryptanalysis; Other Attacks on EPCBC; Implementation of EPCBC; Conclusion; References; On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures; Introduction; Preliminaries; Generalized Feistel Structure (GFS); Diffusion of GFS; Equivalence of GFSs; Analysis on DRmax(); Type 1 GFS
- Control code
- 769754682
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 311 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642255137
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-25513-7
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)769754682
- Label
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Title; Preface; Table of Contents; Invited Talks; Expressive Encryption Systems from Lattices; Introduction; Background; Lattice Notions; Discrete Gaussians; Sampling and Preimage Sampling; Hardness Assumption; Classic Constructions; Regev Public-Key Encryption; GPV Identity-Based Encryption; Techniques and Refinements; Bit-by-Bit Standard-Model IBE; All-at-Once Standard-Model IBE; Adaptive or F̀̀ull'' Security; Delegation and Hierarchies; Concatenation-Based Delegation; Multiplicative In-Place Delegation; Attributes and Predicates; Conclusion; References
- Breaking Fully-Homomorphic-Encryption ChallengesReferences; Symmetric Cryptanalysis; Cube Cryptanalysis of Hitag2 Stream Cipher; Introduction; Hitag2 Stream Cipher; Cube Attack; Cube Attack on Hitag2; First Phase: Black-Box Attack; Second Phase: White-Box Attack; Third Phase: Exhaustive Search Attack; Experimental Results; Conclusion; References; New Impossible Differential Cryptanalysis of Reduced-Round Camellia; Introduction; Preliminaries; Notations; A Brief Description of Camellia; 7-Round Impossible Differential of Camellia; Impossible Differential Attack on 10-Round Camellia-128
- Attack on 10-Round Camellia-192 and 11-Round Camellia-256Attack on 10-Round Camellia-192; Attack on 11-Round Camellia-256; Conclusion; References; The Initialization Stage Analysis of ZUC v1.5; Introduction; Preliminaries; ZUC v1.5; S-Functions; The Chosen-IV Attack of ZUC v1.5; The Definition of Differences; An Chosen-IV Differential Path of ZUC v1.5; The Differential Properties of Operations in ZUC v1.5; The Probability of the Differential; Conclusion; References; Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48; Introduction; PRINTCipher
- Algebraic DescriptionSAT Techniques for Algebraic System Solving; Conversion Techniques; Optimal Tools and Strategies for the Attacks; Algebraic Analysis of PRINTCipher-48; Attack on Round-Reduced PRINTCipher-48; Additional Bits at Round Four; Side Channel Analysis of the Full PRINTCipher-48; Conclusion and Future Work; References; Symmetric Ciphers; EPCBC -- A Block Cipher Suitable for Electronic Product Code Encryption; Introduction; The Electronic Product Code -- EPC; A New Block Cipher Suitable for EPC Encryption: EPCBC; EPCBC(48,96) -- EPCBC with 48-Bit Block Size and 96-Bit Key Size
- EPCBC(96,96) -- EPCBC with 96-Bit Block Size and 96-Bit Key SizeImproved Differential and Linear Cryptanalyis of PR-n; Brief Description of PR-n; Improved Differential and Linear Cryptanalysis; Security Analysis of EPCBC; Differential, Linear and Related-Key Differential Cryptanalysis; Other Attacks on EPCBC; Implementation of EPCBC; Conclusion; References; On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures; Introduction; Preliminaries; Generalized Feistel Structure (GFS); Diffusion of GFS; Equivalence of GFSs; Analysis on DRmax(); Type 1 GFS
- Control code
- 769754682
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 311 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642255137
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-25513-7
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)769754682
Subject
- Coding theory
- Computational complexity
- Computer Communication Networks
- Computer Science
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures -- Congresses
- Computer science
- Conference papers and proceedings
- Conference papers and proceedings
- Data Structures, Cryptology and Information Theory
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Data protection
- Data structures (Computer science)
- Engineering & Applied Sciences
- Informatique
- Systems and Data Security
- Coding and Information Theory
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Cryptology-and-network-security--10th/emQxX2JGV_w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Cryptology-and-network-security--10th/emQxX2JGV_w/">Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Cryptology-and-network-security--10th/emQxX2JGV_w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Cryptology-and-network-security--10th/emQxX2JGV_w/">Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>