Cryptology and Network Security

15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

  • Sara Foresti
  • Giuseppe Persiano

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10052)

Also part of the Security and Cryptology book sub series (LNSC, volume 10052)

Table of contents

  1. Signatures and Hash

  2. MultiParty Computation

    1. Front Matter
      Pages 263-263
    2. Kalikinkar Mandal, Basel Alomair, Radha Poovendran
      Pages 265-283
    3. Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rúa, Aikaterini Mitrokotsa
      Pages 284-298
    4. Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine
      Pages 299-315
  3. Symmetric Cryptography and Authentication

    1. Front Matter
      Pages 317-317
    2. Jian Zhang, Wenling Wu
      Pages 319-334
    3. Aysajan Abidin, Enrique Argones Rúa, Bart Preneel
      Pages 335-349
    4. Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto
      Pages 350-364
  4. System Security

    1. Front Matter
      Pages 365-365
    2. Jean-Claude Royer, Anderson Santana De Oliveira
      Pages 367-382
    3. Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi
      Pages 400-415
  5. Functional and Homomorphic Encryption

    1. Front Matter
      Pages 417-417
    2. Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
      Pages 419-434
    3. Eunkyung Kim, Mehdi Tibouchi
      Pages 435-450
  6. Information Theoretic Security

    1. Front Matter
      Pages 465-465
    2. Liqun Chen, Thalia M. Laing, Keith M. Martin
      Pages 467-483

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.

The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.


Keywords

biometric authentication cloud computing cryptanalysis malware classification secure multiparty computation ad hoc mobile cloud authenticated encryption certificates cloud privacy digital signatures graph algorithms information theoretical security mobile networks obfuscation online authenticated encryption post-quantum cryptography privacy-preserving authentication side channel attack SVM universal hash functions

Editors and affiliations

  • Sara Foresti
    • 1
  • Giuseppe Persiano
    • 2
  1. 1.Università degli Studi di MilanoCremaItaly
  2. 2.Università degli Studi di SalernoFiscianoItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-48965-0
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-48964-3
  • Online ISBN 978-3-319-48965-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book