Advertisement

Cryptology and Network Security

15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

  • Sara Foresti
  • Giuseppe Persiano

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10052)

Also part of the Security and Cryptology book sub series (LNSC, volume 10052)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Cryptanalysis of Symmetric Key

    1. Front Matter
      Pages 1-1
    2. Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma
      Pages 3-18
    3. Yosuke Todo, Masakatu Morii
      Pages 19-35
    4. Noor R. Al-Kazaz, Sean A. Irvine, William J. Teahan
      Pages 36-52
  3. SideChannel Attacks and Implementation

    1. Front Matter
      Pages 53-53
    2. Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari-Kermani
      Pages 88-103
  4. Lattice-Based Cryptography

    1. Front Matter
      Pages 105-105
    2. Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
      Pages 107-123
  5. Virtual Private Network

    1. Front Matter
      Pages 157-157
    2. Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk
      Pages 159-175
    3. Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan
      Pages 176-191
    4. Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Félix Brezo
      Pages 192-207
  6. Signatures and Hash

    1. Front Matter
      Pages 209-209
    2. David Derler, Stephan Krenn, Daniel Slamanig
      Pages 211-227
    3. Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
      Pages 228-244
  7. MultiParty Computation

    1. Front Matter
      Pages 263-263
    2. Kalikinkar Mandal, Basel Alomair, Radha Poovendran
      Pages 265-283
    3. Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rúa, Aikaterini Mitrokotsa
      Pages 284-298
    4. Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine
      Pages 299-315
  8. Symmetric Cryptography and Authentication

    1. Front Matter
      Pages 317-317
    2. Jian Zhang, Wenling Wu
      Pages 319-334
    3. Aysajan Abidin, Enrique Argones Rúa, Bart Preneel
      Pages 335-349
    4. Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto
      Pages 350-364
  9. System Security

    1. Front Matter
      Pages 365-365
    2. Jean-Claude Royer, Anderson Santana De Oliveira
      Pages 367-382
    3. Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi
      Pages 400-415
  10. Functional and Homomorphic Encryption

    1. Front Matter
      Pages 417-417
    2. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
      Pages 419-434
    3. Eunkyung Kim, Mehdi Tibouchi
      Pages 435-450
  11. Information Theoretic Security

    1. Front Matter
      Pages 465-465
    2. Liqun Chen, Thalia M. Laing, Keith M. Martin
      Pages 467-483
    3. Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta
      Pages 500-517
  12. Malware and Attacks

    1. Front Matter
      Pages 519-519
    2. Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama
      Pages 521-531
    3. Faustin Mbol, Jean-Marc Robert, Alireza Sadighian
      Pages 532-541
    4. Joash W. J. Tan, Roland H. C. Yap
      Pages 542-551
    5. Valérie Nachef, Nicolas Marrière, Emmanuel Volte
      Pages 562-572
    6. Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas
      Pages 573-582
  13. MultiParty Computation and Functional Encryption

    1. Front Matter
      Pages 583-583
    2. Vincenzo Iovino, Qiang Tang, Karol Żebrowski
      Pages 585-593

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.

The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.


Keywords

biometric authentication cloud computing cryptanalysis malware classification secure multiparty computation ad hoc mobile cloud authenticated encryption certificates cloud privacy digital signatures graph algorithms information theoretical security mobile networks obfuscation online authenticated encryption post-quantum cryptography privacy-preserving authentication side channel attack SVM universal hash functions

Editors and affiliations

  • Sara Foresti
    • 1
  • Giuseppe Persiano
    • 2
  1. 1.Università degli Studi di MilanoCremaItaly
  2. 2.Università degli Studi di SalernoFiscianoItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-48965-0
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-48964-3
  • Online ISBN 978-3-319-48965-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site