Skip to main content
  • Conference proceedings
  • © 2011

Cryptology and Network Security

10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7092)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Invited Talks

  3. Symmetric Cryptanalysis

    1. Cube Cryptanalysis of Hitag2 Stream Cipher

      • Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng
      Pages 15-25
    2. New Impossible Differential Cryptanalysis of Reduced-Round Camellia

      • Leibo Li, Jiazhe Chen, Keting Jia
      Pages 26-39
    3. The Initialization Stage Analysis of ZUC v1.5

      • Chunfang Zhou, Xiutao Feng, Dongdai Lin
      Pages 40-53
  4. Symmetric Ciphers

    1. EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption

      • Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen
      Pages 76-97
  5. Public Key Cryptography

    1. Security Analysis of an Improved MFE Public Key Cryptosystem

      • Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao
      Pages 118-125
    2. A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack

      • Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu
      Pages 126-137
  6. Protocol Attacks

    1. Comments on the SM2 Key Exchange Protocol

      • Jing Xu, Dengguo Feng
      Pages 160-171
    2. Passive Attack on RFID LMAP++ Authentication Protocol

      • Shao-hui Wang, Wei-wei Zhang
      Pages 185-193
  7. Privacy Techniques

    1. Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model

      • Sébastien Canard, Roch Lescuyer, Jacques Traoré
      Pages 194-213
    2. Group Signature with Constant Revocation Costs for Signers and Verifiers

      • Chun-I Fan, Ruei-Hau Hsu, Mark Manulis
      Pages 214-233
  8. Varia

    1. AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax

      • Yang-Wai Chow, Willy Susilo
      Pages 255-271
    2. Towards Attribute Revocation in Key-Policy Attribute Based Encryption

      • Pengpian Wang, Dengguo Feng, Liwu Zhang
      Pages 272-291

Other Volumes

  1. Cryptology and Network Security

About this book

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Editors and Affiliations

  • The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China

    Dongdai Lin

  • Computer Science Department, University of California, Irvine, USA

    Gene Tsudik

  • Shandong University, China

    Xiaoyun Wang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access