© 2016

Cryptology and Network Security

15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

  • Sara Foresti
  • Giuseppe Persiano
Conference proceedings CANS 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10052)

Also part of the Security and Cryptology book sub series (LNSC, volume 10052)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Cryptanalysis of Symmetric Key

    1. Front Matter
      Pages 1-1
    2. Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma
      Pages 3-18
    3. Yosuke Todo, Masakatu Morii
      Pages 19-35
    4. Noor R. Al-Kazaz, Sean A. Irvine, William J. Teahan
      Pages 36-52
  3. SideChannel Attacks and Implementation

    1. Front Matter
      Pages 53-53
    2. Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
      Pages 88-103
  4. Lattice-Based Cryptography

    1. Front Matter
      Pages 105-105
    2. Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
      Pages 107-123
  5. Virtual Private Network

    1. Front Matter
      Pages 157-157
    2. Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk
      Pages 159-175
    3. Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan
      Pages 176-191
    4. Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Félix Brezo
      Pages 192-207
  6. Signatures and Hash

    1. Front Matter
      Pages 209-209
    2. David Derler, Stephan Krenn, Daniel Slamanig
      Pages 211-227
    3. Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
      Pages 228-244

About these proceedings


This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.

The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.


biometric authentication cloud computing cryptanalysis malware classification secure multiparty computation ad hoc mobile cloud authenticated encryption certificates cloud privacy digital signatures graph algorithms information theoretical security mobile networks obfuscation online authenticated encryption post-quantum cryptography privacy-preserving authentication side channel attack SVM universal hash functions

Editors and affiliations

  • Sara Foresti
    • 1
  • Giuseppe Persiano
    • 2
  1. 1.Università degli Studi di MilanoCremaItaly
  2. 2.Università degli Studi di SalernoFiscianoItaly

Bibliographic information