Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kaoru Kurosawa, Yasuhiro Ohtaki |
How to Update Documents Verifiably in Searchable Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 309-328, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld |
Truncated Differential Analysis of Reduced-Round LBlock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 291-308, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Babins Shrestha, Nitesh Saxena, Justin Harrison |
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 199-217, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab (eds.) |
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![Springer, 978-3-319-02936-8 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bo Zhu 0007, Yin Tan, Guang Gong |
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 20-38, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Liang Feng Zhang, Reihaneh Safavi-Naini |
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 329-348, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Xue, Bao Li 0001, Xianhui Lu, Dingding Jia, Yamin Liu |
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 235-250, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Kheir, Chirine Wolley |
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 162-178, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valérie Nachef, Emmanuel Volte, Jacques Patarin |
Differential Attacks on Generalized Feistel Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 1-19, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang |
Efficient Modular NIZK Arguments from Shift and Product. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 92-121, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Mark Manulis |
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 251-270, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Volte, Jacques Patarin, Valérie Nachef |
Zero Knowledge with Rubik's Cubes and Non-abelian Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 74-91, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Adam O'Neill |
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 218-234, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Szongott, Benjamin Henne, Matthew Smith 0001 |
Mobile Evil Twin Malnets - The Worst of Both Worlds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 126-141, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Xu 0022, Lei Hu, Siwei Sun, Ping Wang |
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 32-42, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Ouafi, Serge Vaudenay |
Strong Privacy for RFID Systems from Plaintext-Aware Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 247-262, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr. |
Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 56-71, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona |
Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 158-168, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa |
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 201-217, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 169-184, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Omer Berkman, Benny Pinkas, Moti Yung |
Firm Grip Handshakes: A Tool for Bidirectional Vouching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 142-157, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Liping Ding, Yongji Wang 0002 |
Improved Linear Analysis on Block Cipher MULTI2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 72-85, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik |
Fast and Private Computation of Cardinality of Set Intersection and Union. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 218-231, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Orestis Tsigkas, Dimitrios Tzovaras |
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 114-125, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser |
A Simple Key-Recovery Attack on McOE-X. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 23-31, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Falko Strenzke |
Fast and Secure Root Finding for Code-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 232-246, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Orhun Kara, Ferhat Karakoç |
Fixed Points of Special Type and Cryptanalysis of Full GOST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 86-97, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores |
Some Representations of the S-Box of Camellia in GF(((22)2)2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 296-309, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Yiren Mo |
How to Enhance the Security on the Least Significant Bit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 263-279, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.) |
Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![Springer, 978-3-642-35403-8 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
Attacking Animated CAPTCHAs via Character Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 98-113, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu |
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 12-22, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Lehmann, Willi Meier |
Conditional Differential Cryptanalysis of Grain-128a. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 1-11, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mustafa Çoban, Ferhat Karakoç, Özkan Boztas |
Biclique Cryptanalysis of TWINE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 43-55, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede |
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 185-200, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Ahmed Khan, Ferruh Özbudak |
Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings, pp. 280-295, 2012, Springer, 978-3-642-35403-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 1-12, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yang-Wai Chow, Willy Susilo |
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 255-271, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Yanagihara, Tetsu Iwata |
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 98-117, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dongdai Lin, Gene Tsudik, Xiaoyun Wang 0001 (eds.) |
Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![Springer, 978-3-642-25512-0 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuyun Nie, Zhaohu Xu, Li Lu 0001, Yongjian Liao |
Security Analysis of an Improved MFE Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 118-125, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jing Xu 0002, Dengguo Feng |
Comments on the SM2 Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 160-171, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen |
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 76-97, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chun-I Fan, Ruei-Hau Hsu, Mark Manulis |
Group Signature with Constant Revocation Costs for Signers and Verifiers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 214-233, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pengpian Wang, Dengguo Feng, Liwu Zhang |
Towards Attribute Revocation in Key-Policy Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 272-291, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Bulygin, Johannes Buchmann 0001 |
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 54-75, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Katsuyuki Takashima |
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 138-159, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Leibo Li, Jiazhe Chen, Keting Jia |
New Impossible Differential Cryptanalysis of Reduced-Round Camellia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 26-39, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu |
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 126-137, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng |
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 172-184, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Payman Mohassel |
Fast Computation on Encrypted Polynomials and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 234-254, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Roch Lescuyer, Jacques Traoré |
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 194-213, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shaohui Wang, Weiwei Zhang |
Passive Attack on RFID LMAP++ Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 185-193, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng |
Cube Cryptanalysis of Hitag2 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 15-25, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen |
Breaking Fully-Homomorphic-Encryption Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 13-14, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ning Ding 0001, Dawu Gu |
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 292-311, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chunfang Zhou, Xiutao Feng, Dongdai Lin |
The Initialization Stage Analysis of ZUC v1.5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 40-53, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi |
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 199-200, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Guajardo, Bart Mennink, Berry Schoenmakers |
Anonymous Credential Schemes with Encrypted Attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 314-333, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chenghang Du, Jiazhe Chen |
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 20-30, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Guomin Yang, Chik How Tan |
Dynamic Group Key Exchange Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 261-277, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Predicate Encryption with Partial Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 298-313, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bozhan Su, Wenling Wu, Shuang Wu 0004, Le Dong |
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 124-139, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johann Großschädl, Ilya Kizhvatov |
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 44-61, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marine Minier, Raphael C.-W. Phan, Benjamin Pousse |
Integral Distinguishers of Some SHA-3 Candidates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 106-123, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin Eian |
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 62-75, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu 0002 |
TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 241-260, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski |
Analysis of the MQQ Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 169-183, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chang N. Zhang, Qian Yu, Xiao Wei Liu |
An Algorithm Based Concurrent Error Detection Scheme for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 31-42, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Buchmann 0001, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner |
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 140-155, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa |
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 43, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani |
Generating Parameters for Algebraic Torus-Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 156-168, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen |
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 96-105, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Willy Susilo, Yi Mu 0001 |
Towards a Cryptographic Treatment of Publish/Subscribe Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 201-220, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou |
STE3D-CAP: Stereoscopic 3D CAPTCHA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 221-240, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Araújo 0001, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi |
Towards Practical and Secure Coercion-Resistant Electronic Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 278-297, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Günther Lackner, Peter Teufl, Roman Weinberger |
User Tracking Based on Behavioral Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 76-95, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Abed, Sébastien Canard |
One Time Anonymous Certificate: X.509 Supporting Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 334-353, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay |
Cryptanalysis of Reduced-Round MIBS Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 1-19, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.) |
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![Springer, 978-3-642-17618-0 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roghaie Mahdavi, Abolghasem Saiadian |
Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings, pp. 184-198, 2010, Springer, 978-3-642-17618-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi |
Relinkable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 518-536, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, pairing, ring signature |
1 | Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 1-20, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Garbled Circuit, Millionaires Problem, Auctions, Secure Computation, Minimum Distance |
1 | Mario Cagalj, Nitesh Saxena, Ersin Uzun |
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 443-462, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless Networks, Authentication, Usable Security, Distance Bounding |
1 | Christophe Tartary |
Ensuring Authentication of Digital Information Using Cryptographic Accumulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 315-333, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel |
1 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 349-361, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
1 | Timo Brecher, Emmanuel Bresson, Mark Manulis |
Fully Robust Tree-Diffie-Hellman Group Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 478-497, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya |
On the Complexity of Computing Discrete Logarithms over Algebraic Tori. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 433-442, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
algebraic tori, order certified discrete logarithms, Turing reduction |
1 | Martin Ågren, Thomas Johansson 0001, Martin Hell |
Improving the Rainbow Attack by Reusing Colours. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 362-378, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk |
Extensions of the Cube Attack Based on Low Degree Annihilators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 87-102, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cube Attack, Low-Degree Annihilators, Algebraic Attack |
1 | Marc Joye |
On Cryptographic Schemes Based on Discrete Logarithms and Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 41-52, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Torus-based cryptography, ring ? N, factoring problem, ACJT group signatures, compression, discrete logarithm problem |
1 | Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos |
Privacy-Preserving Relationship Path Discovery in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 189-208, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Erik Dahmen, Christoph Krauß |
Short Hash-Based Signatures for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 463-476, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain |
1 | Adam D. Smith |
Asymptotically Optimal and Private Statistical Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 53-57, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Perrig |
Building Secure Networked Systems with Code Attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 278, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner |
Algebraic Attack on the MQQ Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 392-401, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis |
1 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 259-277, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
1 | Nitesh Saxena, Md. Borhan Uddin |
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 154-173, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Key Distribution |
1 | Georg Fuchsbauer, David Pointcheval, Damien Vergnaud |
Transferable Constant-Size Fair E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 226-247, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin |
DepenDNS: Dependable Mechanism against DNS Cache Poisoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 174-188, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|