Skip to main content
  • Conference proceedings
  • © 2010

Cryptology and Network Security

9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings

  • Fast track conference proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6467)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Block Ciphers

    1. Cryptanalysis of Reduced-Round MIBS Block Cipher

      • Asli Bay, Jorge Nakahara Jr., Serge Vaudenay
      Pages 1-19
    2. An Algorithm Based Concurrent Error Detection Scheme for AES

      • Chang N. Zhang, Qian Yu, Xiao Wei Liu
      Pages 31-42
  3. Wireless Network Security

    1. User Tracking Based on Behavioral Fingerprints

      • Günther Lackner, Peter Teufl, Roman Weinberger
      Pages 76-95
  4. Hash Functions

    1. On the Collision and Preimage Resistance of Certain Two-Call Hash Functions

      • Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen
      Pages 96-105
    2. Integral Distinguishers of Some SHA-3 Candidates

      • Marine Minier, Raphael C. -W. Phan, Benjamin Pousse
      Pages 106-123
    3. Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE

      • Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
      Pages 124-139
  5. Public Key Cryptography

    1. Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems

      • Johannes Buchmann, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner
      Pages 140-155
    2. Generating Parameters for Algebraic Torus-Based Cryptosystems

      • Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani
      Pages 156-168
    3. Analysis of the MQQ Public Key Cryptosystem

      • Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski
      Pages 169-183
  6. Secure Mechanisms

    1. Towards a Cryptographic Treatment of Publish/Subscribe Systems

      • Tsz Hon Yuen, Willy Susilo, Yi Mu
      Pages 201-220
    2. STE3D-CAP: Stereoscopic 3D CAPTCHA

      • Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou
      Pages 221-240
    3. TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism

      • Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu
      Pages 241-260
  7. Cryptographic Protocols

    1. Dynamic Group Key Exchange Revisited

      • Guomin Yang, Chik How Tan
      Pages 261-277

Other Volumes

  1. Cryptology and Network Security

About this book

The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who assisted with reviewing and the CANS Steering Committee for their help. We thank Shai Halevi for use of his Web-Submission-and-Review software that was used for the electronic s- mission and review of the submitted papers, and we thank the International Association for Cryptologic Research (IACR) for Web hosting of the software.

Editors and Affiliations

  • Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia

    Swee-Huay Heng

  • Department of Computer Science, Rutgers University, Piscataway, USA

    Rebecca N. Wright

  • Faculty of Engineering and Science, Universiti Tunku Abdul Rahman, Kuala Lumpur, Malaysia

    Bok-Min Goi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access