Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

  • Raphaël C.-W. Phan
  • Moti Yung
Conference proceedings Mycrypt 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10311)

Also part of the Security and Cryptology book sub series (LNSC, volume 10311)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Keynotes

    1. Front Matter
      Pages 1-1
  3. Revisiting Tradition

    1. Front Matter
      Pages 19-19
    2. Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
      Pages 21-55
    3. Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So
      Pages 56-82
  4. Different Paradigms

    1. Front Matter
      Pages 109-109
    2. Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
      Pages 111-126
    3. Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
      Pages 127-144
    4. Michal Kulis, Pawel Lorek, Filip Zagorski
      Pages 145-167
  5. Cryptofication

    1. Front Matter
      Pages 169-169
    2. Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
      Pages 171-192
    3. Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
      Pages 193-211
  6. Malicious Cryptography

    1. Front Matter
      Pages 213-213
    2. Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski
      Pages 215-232
    3. Herman Galteland, Kristian Gjøsteen
      Pages 233-251
    4. Mirosław Kutyłowski, Jacek Cichoń, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang
      Pages 252-274
  7. Advances in Cryptanalysis

    1. Front Matter
      Pages 275-275

About these proceedings


This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.



anonymity authentication cryptanalysis cryptographic protocols cryptography cypher implementation delegation of authorities DES intrusion detection privacy Rijndael attacks RSA security engineering signature schemes systems security trust requirements

Editors and affiliations

  • Raphaël C.-W. Phan
    • 1
  • Moti Yung
    • 2
  1. 1.Multimedia University, MMUCyberjayaMalaysia
  2. 2.Snapchat and Columbia UniversityNew YorkUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-61272-0
  • Online ISBN 978-3-319-61273-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book