Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kaoru Kurosawa, Yasuhiro Ohtaki |
How to Update Documents Verifiably in Searchable Symmetric Encryption. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld |
Truncated Differential Analysis of Reduced-Round LBlock. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Babins Shrestha, Nitesh Saxena, Justin Harrison |
Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab (eds.) |
Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bo Zhu 0007, Yin Tan, Guang Gong |
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Liang Feng Zhang, Reihaneh Safavi-Naini |
Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Xue, Bao Li 0001, Xianhui Lu, Dingding Jia, Yamin Liu |
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Kheir, Chirine Wolley |
BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Valérie Nachef, Emmanuel Volte, Jacques Patarin |
Differential Attacks on Generalized Feistel Schemes. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang |
Efficient Modular NIZK Arguments from Shift and Product. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Veronika Kuchta, Mark Manulis |
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Volte, Jacques Patarin, Valérie Nachef |
Zero Knowledge with Rubik's Cubes and Non-abelian Groups. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare, Adam O'Neill |
Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. |
CANS |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Szongott, Benjamin Henne, Matthew Smith 0001 |
Mobile Evil Twin Malnets - The Worst of Both Worlds. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Xu 0022, Lei Hu, Siwei Sun, Ping Wang |
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Ouafi, Serge Vaudenay |
Strong Privacy for RFID Systems from Plaintext-Aware Encryption. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr. |
Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys). |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona |
Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa |
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Omer Berkman, Benny Pinkas, Moti Yung |
Firm Grip Handshakes: A Tool for Bidirectional Vouching. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Liping Ding, Yongji Wang 0002 |
Improved Linear Analysis on Block Cipher MULTI2. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik |
Fast and Private Computation of Cardinality of Set Intersection and Union. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Orestis Tsigkas, Dimitrios Tzovaras |
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser |
A Simple Key-Recovery Attack on McOE-X. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Falko Strenzke |
Fast and Secure Root Finding for Code-Based Cryptosystems. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Orhun Kara, Ferhat Karakoç |
Fixed Points of Special Type and Cryptanalysis of Full GOST. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores |
Some Representations of the S-Box of Camellia in GF(((22)2)2). |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Yiren Mo |
How to Enhance the Security on the Least Significant Bit. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.) |
Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo |
Attacking Animated CAPTCHAs via Character Extraction. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu |
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Lehmann, Willi Meier |
Conditional Differential Cryptanalysis of Grain-128a. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mustafa Çoban, Ferhat Karakoç, Özkan Boztas |
Biclique Cryptanalysis of TWINE. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede |
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mansoor Ahmed Khan, Ferruh Özbudak |
Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions. |
CANS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture). |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yang-Wai Chow, Willy Susilo |
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Yanagihara, Tetsu Iwata |
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dongdai Lin, Gene Tsudik, Xiaoyun Wang 0001 (eds.) |
Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuyun Nie, Zhaohu Xu, Li Lu 0001, Yongjian Liao |
Security Analysis of an Improved MFE Public Key Cryptosystem. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jing Xu 0002, Dengguo Feng |
Comments on the SM2 Key Exchange Protocol. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen |
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chun-I Fan, Ruei-Hau Hsu, Mark Manulis |
Group Signature with Constant Revocation Costs for Signers and Verifiers. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pengpian Wang, Dengguo Feng, Liwu Zhang |
Towards Attribute Revocation in Key-Policy Attribute Based Encryption. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Bulygin, Johannes Buchmann 0001 |
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tatsuaki Okamoto, Katsuyuki Takashima |
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Leibo Li, Jiazhe Chen, Keting Jia |
New Impossible Differential Cryptanalysis of Reduced-Round Camellia. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu |
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng |
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Payman Mohassel |
Fast Computation on Encrypted Polynomials and Applications. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Roch Lescuyer, Jacques Traoré |
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shaohui Wang, Weiwei Zhang |
Passive Attack on RFID LMAP++ Authentication Protocol. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng |
Cube Cryptanalysis of Hitag2 Stream Cipher. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Phong Q. Nguyen |
Breaking Fully-Homomorphic-Encryption Challenges. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ning Ding 0001, Dawu Gu |
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chunfang Zhou, Xiutao Feng, Dongdai Lin |
The Initialization Stage Analysis of ZUC v1.5. |
CANS |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi |
Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Guajardo, Bart Mennink, Berry Schoenmakers |
Anonymous Credential Schemes with Encrypted Attributes. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chenghang Du, Jiazhe Chen |
Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Guomin Yang, Chik How Tan |
Dynamic Group Key Exchange Revisited. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Predicate Encryption with Partial Public Keys. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bozhan Su, Wenling Wu, Shuang Wu 0004, Le Dong |
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johann Großschädl, Ilya Kizhvatov |
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marine Minier, Raphael C.-W. Phan, Benjamin Pousse |
Integral Distinguishers of Some SHA-3 Candidates. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Martin Eian |
A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu 0002 |
TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski |
Analysis of the MQQ Public Key Cryptosystem. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chang N. Zhang, Qian Yu, Xiao Wei Liu |
An Algorithm Based Concurrent Error Detection Scheme for AES. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Buchmann 0001, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner |
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa |
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani |
Generating Parameters for Algebraic Torus-Based Cryptosystems. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen |
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Willy Susilo, Yi Mu 0001 |
Towards a Cryptographic Treatment of Publish/Subscribe Systems. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou |
STE3D-CAP: Stereoscopic 3D CAPTCHA. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Araújo 0001, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi |
Towards Practical and Secure Coercion-Resistant Electronic Elections. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Günther Lackner, Peter Teufl, Roman Weinberger |
User Tracking Based on Behavioral Fingerprints. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Abed, Sébastien Canard |
One Time Anonymous Certificate: X.509 Supporting Anonymity. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay |
Cryptanalysis of Reduced-Round MIBS Block Cipher. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.) |
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roghaie Mahdavi, Abolghasem Saiadian |
Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi |
Relinkable Ring Signature. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
anonymity, pairing, ring signature |
1 | Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Garbled Circuit, Millionaires Problem, Auctions, Secure Computation, Minimum Distance |
1 | Mario Cagalj, Nitesh Saxena, Ersin Uzun |
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Wireless Networks, Authentication, Usable Security, Distance Bounding |
1 | Christophe Tartary |
Ensuring Authentication of Digital Information Using Cryptographic Accumulators. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel |
1 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
1 | Timo Brecher, Emmanuel Bresson, Mark Manulis |
Fully Robust Tree-Diffie-Hellman Group Key Exchange. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya |
On the Complexity of Computing Discrete Logarithms over Algebraic Tori. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
algebraic tori, order certified discrete logarithms, Turing reduction |
1 | Martin Ågren, Thomas Johansson 0001, Martin Hell |
Improving the Rainbow Attack by Reusing Colours. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk |
Extensions of the Cube Attack Based on Low Degree Annihilators. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Cube Attack, Low-Degree Annihilators, Algebraic Attack |
1 | Marc Joye |
On Cryptographic Schemes Based on Discrete Logarithms and Factoring. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Torus-based cryptography, ring ? N, factoring problem, ACJT group signatures, compression, discrete logarithm problem |
1 | Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos |
Privacy-Preserving Relationship Path Discovery in Social Networks. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Erik Dahmen, Christoph Krauß |
Short Hash-Based Signatures for Wireless Sensor Networks. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain |
1 | Adam D. Smith |
Asymptotically Optimal and Private Statistical Estimation. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Perrig |
Building Secure Networked Systems with Code Attestation. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner |
Algebraic Attack on the MQQ Public Key Cryptosystem. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis |
1 | Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano |
Private-Key Hidden Vector Encryption with Key Confidentiality. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
private-key predicate encryption, key confidentiality |
1 | Nitesh Saxena, Md. Borhan Uddin |
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Key Distribution |
1 | Georg Fuchsbauer, David Pointcheval, Damien Vergnaud |
Transferable Constant-Size Fair E-Cash. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin |
DepenDNS: Dependable Mechanism against DNS Cache Poisoning. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|