Advertisement

Applied Cryptography and Network Security

15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings

  • Dieter Gollmann
  • Atsuko Miyaji
  • Hiroaki Kikuchi

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10355)

Also part of the Security and Cryptology book sub series (LNSC, volume 10355)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Applied Cryptography

    1. Front Matter
      Pages 1-1
    2. Carlos Aguilar-Melchor, Martin R. Albrecht, Thomas Ricosset
      Pages 3-19
    3. Britta Hale, Tibor Jager, Sebastian Lauer, Jörg Schwenk
      Pages 20-38
    4. Stanisław Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu
      Pages 39-58
    5. Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi
      Pages 59-79
  3. Data Protection and Mobile Security

    1. Front Matter
      Pages 81-81
    2. Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran
      Pages 83-102
    3. Xiaopeng Li, Wenyuan Xu, Song Wang, Xianshan Qu
      Pages 103-123
    4. Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik
      Pages 124-144
    5. Weizhi Meng, Wenjuan Li, Wang Hao Lee, Lijun Jiang, Jianying Zhou
      Pages 145-162
  4. Security Analysis

    1. Front Matter
      Pages 163-163
    2. Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini
      Pages 184-207
    3. Ralph Ankele, Subhadeep Banik, Avik Chakraborti, Eik List, Florian Mendel, Siang Meng Sim et al.
      Pages 208-228
    4. Marcel Keller, Emmanuela Orsini, Dragos Rotaru, Peter Scholl, Eduardo Soria-Vazquez, Srinivas Vivek
      Pages 229-249
  5. Cryptographic Primitives

    1. Front Matter
      Pages 251-251
    2. Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto et al.
      Pages 253-272
    3. Akshayaram Srinivasan, Chandrasekaran Pandu Rangan
      Pages 273-292
    4. San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu
      Pages 293-312
    5. Ronghai Yang, Wing Cheong Lau, Shangcheng Shi
      Pages 313-335
    6. David Bernhard, Ngoc Khanh Nguyen, Bogdan Warinschi
      Pages 336-353
    7. Kaoru Kurosawa, Rie Habuka
      Pages 354-372
    8. Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto et al.
      Pages 373-389
  6. Side Channel Attack

    1. Front Matter
      Pages 391-391
    2. Claude Carlet, Annelie Heuser, Stjepan Picek
      Pages 393-414
    3. Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma
      Pages 415-434
    4. Alex Biryukov, Daniel Dinu, Yann Le Corre
      Pages 435-454
  7. Cryptographic Protocol

    1. Front Matter
      Pages 455-455
    2. Dan Boneh, Sam Kim, Valeria Nikolaenko
      Pages 457-477
    3. Russell W. F. Lai, Sherman S. M. Chow
      Pages 478-497
    4. Jason H. M. Ying, Noboru Kunihiro
      Pages 498-517
    5. Sze Ling Yeo, Zhen Li, Khoongming Khoo, Yu Bin Low
      Pages 518-536
    6. Ignacio Cascudo, Bernardo David
      Pages 537-556
    7. David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri De Ruiter et al.
      Pages 557-578
    8. Olivier Blazy, Céline Chevalier, Paul Germouty
      Pages 579-598
    9. Daniel Demmler, Marco Holz, Thomas Schneider
      Pages 599-619
  8. Data and Server Security

    1. Front Matter
      Pages 621-621
    2. Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia
      Pages 623-644
    3. Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder
      Pages 645-664
    4. John Henry Castellanos, Daniele Antonioli, Nils Ole Tippenhauer, Martín Ochoa
      Pages 665-685
    5. Erik-Oliver Blass, Travis Mayberry, Guevara Noubir
      Pages 686-707
  9. Back Matter
    Pages 709-710

About these proceedings

Introduction

This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017.

The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions. The topics focus on innovative research and current developments that advance the areas of applied cryptography, security analysis, cyber security and privacy, data and server security.

Keywords

algorithms applied computing authentication block ciphers computer networks construction cryptanalysis cryptographic protocols cryptography data security digital signature discrete logarithms electronic document identification systems encryption lattice-based cryptography privacy public key cryptography security side-channel attack software engineering

Editors and affiliations

  • Dieter Gollmann
    • 1
  • Atsuko Miyaji
    • 2
  • Hiroaki Kikuchi
    • 3
  1. 1.Hamburg University of TechnologyHamburgGermany
  2. 2.Graduate School of EngineeringOsaka UniversitySuitaJapan
  3. 3.Department of Frontier Media ScienceMeiji UniversityTokyoJapan

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-61204-1
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-61203-4
  • Online ISBN 978-3-319-61204-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site