CANS B

24 papers

YearTitle / Authors
2010A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP.
Martin Eian
2010An Algorithm Based Concurrent Error Detection Scheme for AES.
Chang N. Zhang, Qian Yu, Xiao Wei Liu
2010Analysis of the MQQ Public Key Cryptosystem.
Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski
2010Anonymous Credential Schemes with Encrypted Attributes.
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
2010Cryptanalysis of Reduced-Round MIBS Block Cipher.
Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay
2010Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).
Ahmad-Reza Sadeghi
2010Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk).
Kaoru Kurosawa
2010Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi
2010Dynamic Group Key Exchange Revisited.
Guomin Yang, Chik How Tan
2010Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations.
Roghaie Mahdavi, Abolghasem Saiadian
2010Generating Parameters for Algebraic Torus-Based Cryptosystems.
Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani
2010Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds.
Chenghang Du, Jiazhe Chen
2010Integral Distinguishers of Some SHA-3 Candidates.
Marine Minier, Raphael C.-W. Phan, Benjamin Pousse
2010Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE.
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
2010On the Collision and Preimage Resistance of Certain Two-Call Hash Functions.
Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen
2010One Time Anonymous Certificate: X.509 Supporting Anonymity.
Aymen Abed, Sébastien Canard
2010Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.
Johann Großschädl, Ilya Kizhvatov
2010Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems.
Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner
2010Predicate Encryption with Partial Public Keys.
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
2010STE3D-CAP: Stereoscopic 3D CAPTCHA.
Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou
2010TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism.
Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu
2010Towards Practical and Secure Coercion-Resistant Electronic Elections.
Roberto Araújo, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi
2010Towards a Cryptographic Treatment of Publish/Subscribe Systems.
Tsz Hon Yuen, Willy Susilo, Yi Mu
2010User Tracking Based on Behavioral Fingerprints.
Günther Lackner, Peter Teufl, Roman Weinberger