CANS B

23 papers

YearTitle / Authors
2012A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2.
Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
2012A Simple Key-Recovery Attack on McOE-X.
Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
2012Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in
Orestis Tsigkas, Dimitrios Tzovaras
2012Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
Atsushi Fujioka, Taiichi Saito, Keita Xagawa
2012Attacking Animated CAPTCHAs via Character Extraction.
Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
2012Biclique Cryptanalysis of TWINE.
Mustafa Çoban, Ferhat Karakoç, Özkan Boztas
2012Conditional Differential Cryptanalysis of Grain-128a.
Michael Lehmann, Willi Meier
2012Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Jun Xu, Lei Hu, Siwei Sun, Ping Wang
2012Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings
Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis
2012Differential and Linear Attacks on the Full WIDEA-
Jorge Nakahara Jr.
2012Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
2012Fast and Private Computation of Cardinality of Set Intersection and Union.
Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
2012Fast and Secure Root Finding for Code-Based Cryptosystems.
Falko Strenzke
2012Firm Grip Handshakes: A Tool for Bidirectional Vouching.
Omer Berkman, Benny Pinkas, Moti Yung
2012Fixed Points of Special Type and Cryptanalysis of Full GOST.
Orhun Kara, Ferhat Karakoç
2012Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round.
Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
2012How to Enhance the Security on the Least Significant Bit.
Atsuko Miyaji, Yiren Mo
2012Improved Linear Analysis on Block Cipher MULTI2.
Yi Lu, Liping Ding, Yongji Wang
2012Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions.
Mansoor Ahmed Khan, Ferruh Özbudak
2012LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks.
Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede
2012Mobile Evil Twin Malnets - The Worst of Both Worlds.
Christian Szongott, Benjamin Henne, Matthew Smith
2012Some Representations of the S-Box of Camellia in
Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores
2012Strong Privacy for RFID Systems from Plaintext-Aware Encryption.
Khaled Ouafi, Serge Vaudenay