Cryptology and Network Security

12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings

  • Michel Abdalla
  • Cristina Nita-Rotaru
  • Ricardo Dahab
Conference proceedings CANS 2013

DOI: 10.1007/978-3-319-02937-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8257)

Table of contents (18 papers)

  1. Front Matter
  2. Cryptanalysis I

  3. Zero-Knowledge Protocols

    1. Zero Knowledge Proofs from Ring-LWE
      Xiang Xie, Rui Xue, Minqian Wang
      Pages 57-73
    2. Zero Knowledge with Rubik’s Cubes and Non-abelian Groups
      Emmanuel Volte, Jacques Patarin, Valérie Nachef
      Pages 74-91
    3. Efficient Modular NIZK Arguments from Shift and Product
      Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
      Pages 92-121
  4. Distributed Protocols

  5. Network Security and Applications

    1. Resource Access Control in the Facebook Model
      Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias
      Pages 179-198
    2. Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture
      Babins Shrestha, Nitesh Saxena, Justin Harrison
      Pages 199-217
  6. Advanced Cryptographic Primitives

  7. Cryptanalysis II

    1. Truncated Differential Analysis of Reduced-Round LBlock
      Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld
      Pages 291-308
  8. Verifiable Computation

  9. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.
The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

Keywords

access control ciphers mobile devices oracle attack symmetric encryption

Editors and affiliations

  • Michel Abdalla
    • 1
  • Cristina Nita-Rotaru
    • 2
  • Ricardo Dahab
    • 3
  1. 1.École Normale Supérieure and CNRS,ParisFrance
  2. 2.Department of Computer SciencePurdue UniversityWest LafayetteUSA
  3. 3.Institute of ComputingUniversity of CampinasCampinasBrazil

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2013
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-02936-8
  • Online ISBN 978-3-319-02937-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349