Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings

Voorkant
Sara Foresti, Giuseppe Persiano
Springer, 30 okt 2016 - 762 pagina's

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.

The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.


 

Inhoudsopgave

A New SCARE Technique for Secret Block Ciphers
3
Compact Representation for Division Property
19
An Automatic Cryptanalysis of Transposition Ciphers Using Compression
36
SideChannel Attacks and Implementation
53
SideChannel Attacks on Threshold Implementations Using a Glitch Algebra
54
Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis
71
Efficient Implementation of Supersingular Isogeny DiffieHellman Key Exchange Protocol on ARM
88
LatticeBased Cryptography
104
Efficient XORBased Ideal tnthreshold Schemes
466
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
484
Efficient CardBased Cryptographic Protocols for Millionaires Problem Utilizing Private Permutations
500
Malware and Attacks
518
Evaluation on Malware Classification by Session Sequence of Common Protocols
519
An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems
532
Detecting Malware Through Antianalysis Signals A Preliminary Study
542
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping Secrecy Amplification Case
552

ServerAided Revocable IdentityBased Encryption from Lattices
105
Speeding up the Number Theoretic Transform for Faster Ideal LatticeBased Cryptography
124
An Efficient LatticeBased Multisignature Scheme with Applications to Bitcoins
140
Virtual Private Network
156
Breaking PPTP VPNs via RADIUS Encryption
157
A NextGeneration Client VPN and Encrypted Email Provider
176
Implementation State of HSTS and HPKP in Both Browsers and Servers
192
Signatures and Hash
208
SignerAnonymous DesignatedVerifier Redactable Signatures for CloudBased Data Sharing
209
How to Disavow a Signature
228
Independence Between Capacity and Online Queries
245
MultiParty Computation
262
Secure ErrorTolerant Graph Matching Protocols
263
Efficient Verifiable Computation of XOR for Biometric Authentication
284
Verifiable MessageLocked Encryption
299
Symmetric Cryptography and Authentication
316
Security of Online AE Schemes in RUP Setting
317
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties
335
Reducing Information Leakage of Searchable Symmetric Encryption
350
System Security
365
AAL and Static Conflict Detection in Policy
367
ComponentOriented Access Control for Deployment of Application Services in Containerized Environments
383
Generic Access Control System for Ad Hoc MCC and Fog Computing
400
Functional and Homomorphic Encryption
416
Secure Reachability Computation on Encrypted Location Checkin Data
419
FHE Over the Integers and Modular Arithmetic Circuits
435
An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization
451
Information Theoretic Security
465
Improved Attacks on Extended Generalized Feistel Networks
562
Exploiting Curve25519donna Built with MSVC 2015
573
MultiParty Computation and Functional Encryption
583
On the Power of Publickey FunctionPrivate Functional Encryption
585
A New Technique for Compacting Secret Key in AttributeBased Broadcast Encryption
594
An Efficient Construction of NonInteractive Secure Multiparty Computation
604
An MPCBased PrivacyPreserving Protocol for a Local Electricity Trading Market
615
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators
626
Multicore FPGA Implementation of ECC with Homogeneous CoZ Coordinate Representation
637
Network Security Privacy and Authentication
648
DNSSEC Misconfigurations in Popular Domains
651
Integral Privacy
661
Sharing Is Caring or Callous?
670
Improving the Sphinx Mix Network
681
User Authentication from Mouse Movement Data Using SVM Classifier
692
Distance Bounding Based on PUF
701
Posters
711
A Secure and Deniable Scheme for LocationBased Services
712
Range Query Integrity in Cloud Data Streams with Efficient Insertion
719
Vulnerability Analysis Using Google and Shodan
725
LanguageBased Hypervisors
731
A First Look at 3G4G Networks
737
A PrivacyPreserving Model for Biometric Fusion
743
Secure and Efficient WhiteBox Encryption Schemes
749
Network Flooding as a Side Channel in Cloud Environments
755
Author Index
761
Copyright

Overige edities - Alles bekijken

Veelvoorkomende woorden en zinsdelen

Bibliografische gegevens