Coverart for item
The Resource Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings, Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.), (electronic resource)

Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings, Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.), (electronic resource)

Label
Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings
Title
Cryptology and network security
Title remainder
11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings
Statement of responsibility
Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.)
Title variation
CANS 2012
Creator
Contributor
Subject
Genre
Language
eng
Summary
Annotation:
Member of
Cataloging source
YDXCP
LC call number
QA76.9.A25
LC item number
I5538 2012
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Conference on Cryptology and Network Security
http://library.link/vocab/relatedWorkOrContributorDate
1949-
http://library.link/vocab/relatedWorkOrContributorName
  • Pieprzyk, Josef
  • Sadeghi, Ahmad-Reza
  • Manulis, Mark
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7712
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer networks
Summary expansion
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory
Label
Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings, Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.), (electronic resource)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Contents
  • Jun Xu, Lei Hu, Siwei Sun, Ping Wang
  • Biclique Cryptanalysis of TWINE
  • Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
  • Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)
  • Jorge Nakahara Jr.
  • Improved Linear Analysis on Block Cipher MULTI2
  • Yi Lu, Liping Ding, Yongji Wang
  • Fixed Points of Special Type and Cryptanalysis of Full GOST
  • Orhun Kara, Ferhat Karakoç
  • Network Security
  • Cryptanalysis
  • Attacking Animated CAPTCHAs via Character Extraction
  • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
  • Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs
  • Orestis Tsigkas, Dimitrios Tzovaras
  • Mobile Evil Twin Malnets - The Worst of Both Worlds
  • Christian Szongott, Benjamin Henne, Matthew Smith
  • Firm Grip Handshakes: A Tool for Bidirectional Vouching
  • Omer Berkman, Benny Pinkas, Moti Yung
  • Cryptographic Protocols
  • Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
  • Conditional Differential Cryptanalysis of Grain-128a
  • Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
  • Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
  • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
  • LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
  • Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
  • Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
  • Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
  • Fast and Private Computation of Cardinality of Set Intersection and Union
  • Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
  • Encryption
  • Michael Lehmann, Willi Meier
  • Fast and Secure Root Finding for Code-Based Cryptosystems
  • Falko Strenzke
  • Strong Privacy for RFID Systems from Plaintext-Aware Encryption
  • Khaled Ouafi, Serge Vaudenay
  • How to Enhance the Security on the Least Significant Bit
  • Atsuko Miyaji, Yiren Mo
  • S-Box Theory
  • Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions
  • Mansoor Ahmed Khan, Ferruh Özbudak
  • Some Representations of the S-Box of Camellia in GF(((22)2)2)
  • A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
  • Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores
  • Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
  • A Simple Key-Recovery Attack on McOE-X
  • Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
  • Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
  • Jun Xu, Lei Hu, Siwei Sun, Ping Wang
  • Biclique Cryptanalysis of TWINE
  • Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
  • Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)
  • Jorge Nakahara Jr.
  • Improved Linear Analysis on Block Cipher MULTI2
  • Yi Lu, Liping Ding, Yongji Wang
  • Fixed Points of Special Type and Cryptanalysis of Full GOST
  • Orhun Kara, Ferhat Karakoç
  • Network Security
  • Cryptanalysis
  • Attacking Animated CAPTCHAs via Character Extraction
  • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
  • Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs
  • Orestis Tsigkas, Dimitrios Tzovaras
  • Mobile Evil Twin Malnets - The Worst of Both Worlds
  • Christian Szongott, Benjamin Henne, Matthew Smith
  • Firm Grip Handshakes: A Tool for Bidirectional Vouching
  • Omer Berkman, Benny Pinkas, Moti Yung
  • Cryptographic Protocols
  • Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
  • Conditional Differential Cryptanalysis of Grain-128a
  • Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
  • Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
  • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
  • LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
  • Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
  • Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
  • Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
  • Fast and Private Computation of Cardinality of Set Intersection and Union
  • Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
  • Encryption
  • Michael Lehmann, Willi Meier
  • Fast and Secure Root Finding for Code-Based Cryptosystems
  • Falko Strenzke
  • Strong Privacy for RFID Systems from Plaintext-Aware Encryption
  • Khaled Ouafi, Serge Vaudenay
  • How to Enhance the Security on the Least Significant Bit
  • Atsuko Miyaji, Yiren Mo
  • S-Box Theory
  • Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions
  • Mansoor Ahmed Khan, Ferruh Özbudak
  • Some Representations of the S-Box of Camellia in GF(((22)2)2)
  • A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
  • Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores
  • Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
  • A Simple Key-Recovery Attack on McOE-X
  • Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
  • Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
  • Jun Xu, Lei Hu, Siwei Sun, Ping Wang
  • Biclique Cryptanalysis of TWINE
  • Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
  • Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)
  • Jorge Nakahara Jr.
  • Improved Linear Analysis on Block Cipher MULTI2
  • Yi Lu, Liping Ding, Yongji Wang
  • Fixed Points of Special Type and Cryptanalysis of Full GOST
  • Orhun Kara, Ferhat Karakoç
  • Network Security
  • Cryptanalysis
  • Attacking Animated CAPTCHAs via Character Extraction
  • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
  • Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs
  • Orestis Tsigkas, Dimitrios Tzovaras
  • Mobile Evil Twin Malnets - The Worst of Both Worlds
  • Christian Szongott, Benjamin Henne, Matthew Smith
  • Firm Grip Handshakes: A Tool for Bidirectional Vouching
  • Omer Berkman, Benny Pinkas, Moti Yung
  • Cryptographic Protocols
  • Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
  • Conditional Differential Cryptanalysis of Grain-128a
  • Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
  • Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
  • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
  • LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
  • Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
  • Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
  • Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
  • Fast and Private Computation of Cardinality of Set Intersection and Union
  • Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
  • Encryption
  • Michael Lehmann, Willi Meier
  • Fast and Secure Root Finding for Code-Based Cryptosystems
  • Falko Strenzke
  • Strong Privacy for RFID Systems from Plaintext-Aware Encryption
  • Khaled Ouafi, Serge Vaudenay
  • How to Enhance the Security on the Least Significant Bit
  • Atsuko Miyaji, Yiren Mo
  • S-Box Theory
  • Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions
  • Mansoor Ahmed Khan, Ferruh Özbudak
  • Some Representations of the S-Box of Camellia in GF(((22)2)2)
  • A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
  • Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores
  • Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
  • A Simple Key-Recovery Attack on McOE-X
  • Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
  • Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
Control code
OCM1bookssj0000810194
Dimensions
unknown
Isbn
9783642354038
Isbn Type
(pbk. : alk. paper)
Lccn
2012953024
Specific material designation
remote
System control number
(WaSeSS)bookssj0000810194
Label
Cryptology and network security : 11th international conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012 : proceedings, Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.), (electronic resource)
Publication
Bibliography note
Includes bibliographical references and index
Contents
  • Jun Xu, Lei Hu, Siwei Sun, Ping Wang
  • Biclique Cryptanalysis of TWINE
  • Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
  • Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)
  • Jorge Nakahara Jr.
  • Improved Linear Analysis on Block Cipher MULTI2
  • Yi Lu, Liping Ding, Yongji Wang
  • Fixed Points of Special Type and Cryptanalysis of Full GOST
  • Orhun Kara, Ferhat Karakoç
  • Network Security
  • Cryptanalysis
  • Attacking Animated CAPTCHAs via Character Extraction
  • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
  • Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs
  • Orestis Tsigkas, Dimitrios Tzovaras
  • Mobile Evil Twin Malnets - The Worst of Both Worlds
  • Christian Szongott, Benjamin Henne, Matthew Smith
  • Firm Grip Handshakes: A Tool for Bidirectional Vouching
  • Omer Berkman, Benny Pinkas, Moti Yung
  • Cryptographic Protocols
  • Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
  • Conditional Differential Cryptanalysis of Grain-128a
  • Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
  • Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
  • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
  • LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
  • Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
  • Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
  • Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
  • Fast and Private Computation of Cardinality of Set Intersection and Union
  • Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
  • Encryption
  • Michael Lehmann, Willi Meier
  • Fast and Secure Root Finding for Code-Based Cryptosystems
  • Falko Strenzke
  • Strong Privacy for RFID Systems from Plaintext-Aware Encryption
  • Khaled Ouafi, Serge Vaudenay
  • How to Enhance the Security on the Least Significant Bit
  • Atsuko Miyaji, Yiren Mo
  • S-Box Theory
  • Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions
  • Mansoor Ahmed Khan, Ferruh Özbudak
  • Some Representations of the S-Box of Camellia in GF(((22)2)2)
  • A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
  • Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores
  • Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
  • A Simple Key-Recovery Attack on McOE-X
  • Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
  • Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
  • Jun Xu, Lei Hu, Siwei Sun, Ping Wang
  • Biclique Cryptanalysis of TWINE
  • Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
  • Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)
  • Jorge Nakahara Jr.
  • Improved Linear Analysis on Block Cipher MULTI2
  • Yi Lu, Liping Ding, Yongji Wang
  • Fixed Points of Special Type and Cryptanalysis of Full GOST
  • Orhun Kara, Ferhat Karakoç
  • Network Security
  • Cryptanalysis
  • Attacking Animated CAPTCHAs via Character Extraction
  • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
  • Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs
  • Orestis Tsigkas, Dimitrios Tzovaras
  • Mobile Evil Twin Malnets - The Worst of Both Worlds
  • Christian Szongott, Benjamin Henne, Matthew Smith
  • Firm Grip Handshakes: A Tool for Bidirectional Vouching
  • Omer Berkman, Benny Pinkas, Moti Yung
  • Cryptographic Protocols
  • Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
  • Conditional Differential Cryptanalysis of Grain-128a
  • Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
  • Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
  • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
  • LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
  • Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
  • Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
  • Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
  • Fast and Private Computation of Cardinality of Set Intersection and Union
  • Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
  • Encryption
  • Michael Lehmann, Willi Meier
  • Fast and Secure Root Finding for Code-Based Cryptosystems
  • Falko Strenzke
  • Strong Privacy for RFID Systems from Plaintext-Aware Encryption
  • Khaled Ouafi, Serge Vaudenay
  • How to Enhance the Security on the Least Significant Bit
  • Atsuko Miyaji, Yiren Mo
  • S-Box Theory
  • Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions
  • Mansoor Ahmed Khan, Ferruh Özbudak
  • Some Representations of the S-Box of Camellia in GF(((22)2)2)
  • A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
  • Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores
  • Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
  • A Simple Key-Recovery Attack on McOE-X
  • Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
  • Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
  • Jun Xu, Lei Hu, Siwei Sun, Ping Wang
  • Biclique Cryptanalysis of TWINE
  • Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
  • Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys)
  • Jorge Nakahara Jr.
  • Improved Linear Analysis on Block Cipher MULTI2
  • Yi Lu, Liping Ding, Yongji Wang
  • Fixed Points of Special Type and Cryptanalysis of Full GOST
  • Orhun Kara, Ferhat Karakoç
  • Network Security
  • Cryptanalysis
  • Attacking Animated CAPTCHAs via Character Extraction
  • Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
  • Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs
  • Orestis Tsigkas, Dimitrios Tzovaras
  • Mobile Evil Twin Malnets - The Worst of Both Worlds
  • Christian Szongott, Benjamin Henne, Matthew Smith
  • Firm Grip Handshakes: A Tool for Bidirectional Vouching
  • Omer Berkman, Benny Pinkas, Moti Yung
  • Cryptographic Protocols
  • Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round
  • Conditional Differential Cryptanalysis of Grain-128a
  • Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
  • Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification
  • Atsushi Fujioka, Taiichi Saito, Keita Xagawa
  • LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks
  • Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
  • Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation
  • Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
  • Fast and Private Computation of Cardinality of Set Intersection and Union
  • Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
  • Encryption
  • Michael Lehmann, Willi Meier
  • Fast and Secure Root Finding for Code-Based Cryptosystems
  • Falko Strenzke
  • Strong Privacy for RFID Systems from Plaintext-Aware Encryption
  • Khaled Ouafi, Serge Vaudenay
  • How to Enhance the Security on the Least Significant Bit
  • Atsuko Miyaji, Yiren Mo
  • S-Box Theory
  • Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions
  • Mansoor Ahmed Khan, Ferruh Özbudak
  • Some Representations of the S-Box of Camellia in GF(((22)2)2)
  • A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
  • Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores
  • Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
  • A Simple Key-Recovery Attack on McOE-X
  • Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
  • Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
Control code
OCM1bookssj0000810194
Dimensions
unknown
Isbn
9783642354038
Isbn Type
(pbk. : alk. paper)
Lccn
2012953024
Specific material designation
remote
System control number
(WaSeSS)bookssj0000810194

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...