Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, ProceedingsSara Foresti, Giuseppe Persiano Springer, 30 okt 2016 - 762 pagina's This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016. The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication. |
Inhoudsopgave
3 | |
19 | |
36 | |
SideChannel Attacks and Implementation | 53 |
SideChannel Attacks on Threshold Implementations Using a Glitch Algebra | 54 |
Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis | 71 |
Efficient Implementation of Supersingular Isogeny DiffieHellman Key Exchange Protocol on ARM | 88 |
LatticeBased Cryptography | 104 |
Efficient XORBased Ideal tnthreshold Schemes | 466 |
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards | 484 |
Efficient CardBased Cryptographic Protocols for Millionaires Problem Utilizing Private Permutations | 500 |
Malware and Attacks | 518 |
Evaluation on Malware Classification by Session Sequence of Common Protocols | 519 |
An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems | 532 |
Detecting Malware Through Antianalysis Signals A Preliminary Study | 542 |
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping Secrecy Amplification Case | 552 |
ServerAided Revocable IdentityBased Encryption from Lattices | 105 |
Speeding up the Number Theoretic Transform for Faster Ideal LatticeBased Cryptography | 124 |
An Efficient LatticeBased Multisignature Scheme with Applications to Bitcoins | 140 |
Virtual Private Network | 156 |
Breaking PPTP VPNs via RADIUS Encryption | 157 |
A NextGeneration Client VPN and Encrypted Email Provider | 176 |
Implementation State of HSTS and HPKP in Both Browsers and Servers | 192 |
Signatures and Hash | 208 |
SignerAnonymous DesignatedVerifier Redactable Signatures for CloudBased Data Sharing | 209 |
How to Disavow a Signature | 228 |
Independence Between Capacity and Online Queries | 245 |
MultiParty Computation | 262 |
Secure ErrorTolerant Graph Matching Protocols | 263 |
Efficient Verifiable Computation of XOR for Biometric Authentication | 284 |
Verifiable MessageLocked Encryption | 299 |
Symmetric Cryptography and Authentication | 316 |
Security of Online AE Schemes in RUP Setting | 317 |
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties | 335 |
Reducing Information Leakage of Searchable Symmetric Encryption | 350 |
System Security | 365 |
AAL and Static Conflict Detection in Policy | 367 |
ComponentOriented Access Control for Deployment of Application Services in Containerized Environments | 383 |
Generic Access Control System for Ad Hoc MCC and Fog Computing | 400 |
Functional and Homomorphic Encryption | 416 |
Secure Reachability Computation on Encrypted Location Checkin Data | 419 |
FHE Over the Integers and Modular Arithmetic Circuits | 435 |
An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization | 451 |
Information Theoretic Security | 465 |
Improved Attacks on Extended Generalized Feistel Networks | 562 |
Exploiting Curve25519donna Built with MSVC 2015 | 573 |
MultiParty Computation and Functional Encryption | 583 |
On the Power of Publickey FunctionPrivate Functional Encryption | 585 |
A New Technique for Compacting Secret Key in AttributeBased Broadcast Encryption | 594 |
An Efficient Construction of NonInteractive Secure Multiparty Computation | 604 |
An MPCBased PrivacyPreserving Protocol for a Local Electricity Trading Market | 615 |
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators | 626 |
Multicore FPGA Implementation of ECC with Homogeneous CoZ Coordinate Representation | 637 |
Network Security Privacy and Authentication | 648 |
DNSSEC Misconfigurations in Popular Domains | 651 |
Integral Privacy | 661 |
Sharing Is Caring or Callous? | 670 |
Improving the Sphinx Mix Network | 681 |
User Authentication from Mouse Movement Data Using SVM Classifier | 692 |
Distance Bounding Based on PUF | 701 |
Posters | 711 |
A Secure and Deniable Scheme for LocationBased Services | 712 |
Range Query Integrity in Cloud Data Streams with Efficient Insertion | 719 |
Vulnerability Analysis Using Google and Shodan | 725 |
LanguageBased Hypervisors | 731 |
A First Look at 3G4G Networks | 737 |
A PrivacyPreserving Model for Biometric Fusion | 743 |
Secure and Efficient WhiteBox Encryption Schemes | 749 |
Network Flooding as a Side Channel in Cloud Environments | 755 |
761 | |
Overige edities - Alles bekijken
Cryptology and Network Security: 15th International Conference, CANS 2016 ... Sara Foresti,Giuseppe Persiano Geen voorbeeld beschikbaar - 2016 |
Veelvoorkomende woorden en zinsdelen
access control adversary AE schemes algorithm Alice analysis anti-analysis applications attacks authentication biometric biometric templates bits block card-based cards ciphers ciphertext circuit client communication computation construction cryptanalysis CRYPTO cryptographic cryptographic protocols database decryption defined denote detection distribution division property DNSSEC domain efficient encryption scheme entropy evaluation files glitch graph group signature hash functions Heidelberg Heidelberg 2015 homomorphic encryption IEEE implementation input integer isogeny keyed sponge lattice-based linear LNCS malware matrix multiplication multisignature NIMPC nodes operations optimal oracle output parameters performance permutation plaintext polynomial problem proof proposed protocol public key query RADIUS random ransomware requires scenario secret key Sect side channel attacks signature scheme simulator social capital SubBytes technique Theorem tion transposition ciphers trapdoor tuple space update variants vector verifier XACML