Cryptology and Network Security

15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

  • Foresti Sara 
  • Persiano Giuseppe 
Conference proceedings CANS 2016

DOI: 10.1007/978-3-319-48965-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10052)

Table of contents (56 papers)

  1. Front Matter
    Pages I-XVI
  2. Cryptanalysis of Symmetric Key

    1. Front Matter
      Pages 1-1
    2. Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers
      Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma
      Pages 3-18
    3. Compact Representation for Division Property
      Yosuke Todo, Masakatu Morii
      Pages 19-35
    4. An Automatic Cryptanalysis of Transposition Ciphers Using Compression
      Noor R. Al-Kazaz, Sean A. Irvine, William J. Teahan
      Pages 36-52
  3. SideChannel Attacks and Implementation

    1. Front Matter
      Pages 53-53
    2. NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM
      Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
      Pages 88-103
  4. Lattice-Based Cryptography

    1. Front Matter
      Pages 105-105
    2. Server-Aided Revocable Identity-Based Encryption from Lattices
      Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
      Pages 107-123
  5. Virtual Private Network

    1. Front Matter
      Pages 157-157
    2. Breaking PPTP VPNs via RADIUS Encryption
      Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk
      Pages 159-175
    3. LEAP: A Next-Generation Client VPN and Encrypted Email Provider
      Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan
      Pages 176-191
    4. Implementation State of HSTS and HPKP in Both Browsers and Servers
      Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Félix Brezo
      Pages 192-207
  6. Signatures and Hash

    1. Front Matter
      Pages 209-209
    2. Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
      David Derler, Stephan Krenn, Daniel Slamanig
      Pages 211-227
    3. Group Signature with Deniability: How to Disavow a Signature
      Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
      Pages 228-244

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.

The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.


Keywords

biometric authentication cloud computing cryptanalysis malware classification secure multiparty computation ad hoc mobile cloud authenticated encryption certificates cloud privacy digital signatures graph algorithms information theoretical security mobile networks obfuscation online authenticated encryption post-quantum cryptography privacy-preserving authentication side channel attack SVM universal hash functions

Editors and affiliations

  • Foresti Sara 
    • 1
  • Persiano Giuseppe 
    • 2
  1. 1.Università degli Studi di MilanoCremaItaly
  2. 2.Università degli Studi di SalernoFiscianoItaly

Bibliographic information

  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-48964-3
  • Online ISBN 978-3-319-48965-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349