CANS B

36 papers

YearTitle / Authors
2009A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle.
Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang
2009Algebraic Attack on the MQQ Public Key Cryptosystem.
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann, Fabian Werner
2009An Analysis of the Compact XSL Attack on BES and Embedded SMS4.
Jiali Choy, Huihui Yap, Khoongming Khoo
2009An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards.
Wenting Jin, Jing Xu
2009Anonymizer-Enabled Security and Privacy for RFID.
Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
2009Asymptotically Optimal and Private Statistical Estimation.
Adam D. Smith
2009Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes.
Nitesh Saxena, Md. Borhan Uddin
2009Building Secure Networked Systems with Code Attestation.
Adrian Perrig
2009Computing on Encrypted Data.
Craig Gentry
2009Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu
2009Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings
Juan A. Garay, Atsuko Miyaji, Akira Otsuka
2009DepenDNS: Dependable Mechanism against DNS Cache Poisoning.
Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin
2009Distinguishing and Second-Preimage Attacks on CBC-Like MACs.
Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu
2009Ensuring Authentication of Digital Information Using Cryptographic Accumulators.
Christophe Tartary
2009Extensions of the Cube Attack Based on Low Degree Annihilators.
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei, Josef Pieprzyk
2009Fully Robust Tree-Diffie-Hellman Group Key Exchange.
Timo Brecher, Emmanuel Bresson, Mark Manulis
2009Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.
Benoît Libert, Damien Vergnaud
2009HPAKE : Password Authentication Secure against Cross-Site User Impersonation.
Xavier Boyen
2009Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider
2009Improving the Rainbow Attack by Reusing Colours.
Martin Ågren, Thomas Johansson, Martin Hell
2009Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT.
Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang
2009MIBS: A New Lightweight Block Cipher.
Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki
2009Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security.
G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2009Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves.
Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez
2009On Cryptographic Schemes Based on Discrete Logarithms and Factoring.
Marc Joye
2009On the Complexity of Computing Discrete Logarithms over Algebraic Tori.
Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya
2009On the Usability of Secure Association of Wireless Devices Based on Distance Bounding.
Mario Cagalj, Nitesh Saxena, Ersin Uzun
2009Privacy-Preserving Relationship Path Discovery in Social Networks.
Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos
2009Private-Key Hidden Vector Encryption with Key Confidentiality.
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
2009RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks.
Chong Hee Kim, Gildas Avoine
2009Relinkable Ring Signature.
Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi
2009Saturation Attack on the Block Cipher HIGHT.
Peng Zhang, Bing Sun, Chao Li
2009Short Hash-Based Signatures for Wireless Sensor Networks.
Erik Dahmen, Christoph Krauß
2009Side Channel Cube Attack on PRESENT.
Lin Yang, Meiqin Wang, Siyuan Qiao
2009Transferable Constant-Size Fair E-Cash.
Georg Fuchsbauer, David Pointcheval, Damien Vergnaud
2009Verifying Anonymous Credential Systems in Applied Pi Calculus.
Xiangxi Li, Yu Zhang, Yuxin Deng