Security and Cryptography for Networks

10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings

  • Vassilis Zikas
  • Roberto De Prisco
Conference proceedings SCN 2016

DOI: 10.1007/978-3-319-44618-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9841)

Table of contents

  1. Front Matter
    Pages I-XIX
  2. Encryption

    1. Front Matter
      Pages 1-1
    2. Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au
      Pages 3-22
    3. Jie Chen, Benoît Libert, Somindu C. Ramanna
      Pages 23-41
    4. Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada
      Pages 42-61
    5. Silvio Biagioni, Daniel Masny, Daniele Venturi
      Pages 62-80
  3. Memory Protection

    1. Front Matter
      Pages 81-81
    2. Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi
      Pages 83-103
    3. Jan Camenisch, Robert R. Enderlein, Ueli Maurer
      Pages 104-125
  4. Multi-party Computation

    1. Front Matter
      Pages 127-127
    2. Ran Cohen, Chris Peikert
      Pages 129-146
    3. Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart
      Pages 147-168
    4. Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV
      Pages 169-187
  5. Zero-Knowledge Proofs

    1. Front Matter
      Pages 189-189
    2. Arno Mittelbach, Daniele Venturi
      Pages 198-215
    3. Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia
      Pages 216-236
    4. Yi Deng, Juan Garay, San Ling, Huaxiong Wang, Moti Yung
      Pages 237-253
  6. Efficient Protocols

    1. Front Matter
      Pages 255-255

About these proceedings


This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016.

The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.


authentication data encryption formal methods and theory of security network security secure multiparty computation adaptive security cryptographic primitives cryptographic protocols fuzzy search oblivious transfer password-based authentication privacy-preserving protocols secret sharing security and privacy security protocols side-channel attack signature schemes spatial encryption symmetric encryption

Editors and affiliations

  • Vassilis Zikas
    • 1
  • Roberto De Prisco
    • 2
  1. 1.Rensselaer Polytechnic InstituteTroyUSA
  2. 2.University of SalernoFiscianoItaly

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-44617-2
  • Online ISBN 978-3-319-44618-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349