Atjaunināt sīkdatņu piekrišanu

Cryptology and Network Security: 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 313 pages, height x width: 235x155 mm, weight: 504 g, XII, 313 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 7092
  • Izdošanas datums: 23-Nov-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642255124
  • ISBN-13: 9783642255120
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 313 pages, height x width: 235x155 mm, weight: 504 g, XII, 313 p., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 7092
  • Izdošanas datums: 23-Nov-2011
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642255124
  • ISBN-13: 9783642255120
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
Invited Talks
Expressive Encryption Systems from Lattices
1(12)
Xavier Boyen
Breaking Fully-Homomorphic-Encryption Challenges (Abstract)
13(2)
Phong Q. Nguyen
Symmetric Cryptanalysis
Cube Cryptanalysis of Hitag2 Stream Cipher
15(11)
Siwei Sun
Lei Hu
Yonghong Xie
Xiangyong Zeng
New Impossible Differential Cryptanalysis of Reduced-Round Camellia
26(14)
Leibo Li
Jiazhe Chen
Keting Jia
The Initialization Stage Analysis of ZUC v1.5
40(14)
Chunfang Zhou
Xiutao Feng
Dongdai Lin
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48
54(22)
Stanislav Bulygin
Johannes Buchmann
Symmetric Ciphers
EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption
76(22)
Huihui Yap
Khoongming Khoo
Axel Poschmann
Matt Henricksen
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures
98(20)
Shingo Yanagihara
Tetsu Iwata
Public Key Cryptography
Security Analysis of an Improved MFE Public Key Cryptosystem
118(8)
Xuyun Nie
Zhaohu Xu
Li Lu
Yongjian Liao
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack
126(12)
Yanbin Pan
Yingpu Deng
Yupeng Jiang
Ziran Tu
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
138(22)
Tatsuaki Okamoto
Katsuyuki Takashima
Protocol Attacks
Comments on the SM2 Key Exchange Protocol
160(12)
Jing Xu
Dengguo Feng
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09
172(13)
Wei-Chuen Yau
Raphael C.-W. Phan
Bok-Min Goi
Swee-Huay Heng
Passive Attack on RFID LMAP++ Authentication Protocol
185(9)
Shao-hui Wang
Wei-wei Zhang
Privacy Techniques
Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model
194(20)
Sebastien Canard
Roch Lescuyer
Jacques Traore
Group Signature with Constant Revocation Costs for Signers and Verifiers
214(20)
Chun-I Fan
Ruei-Hau Hsu
Mark Manulis
Fast Computation on Encrypted Polynomials and Applications
234(21)
Payman Mohassel
Varia
AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax
255(17)
Yang-Wai Chow
Willy Susilo
Towards Attribute Revocation in Key-Policy Attribute Based Encryption
272(20)
Pengpian Wang
Dengguo Feng
Liwu Zhang
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge
292(21)
Ning Ding
Dawu Gu
Author Index 313