default search action
15. CANS 2016: Milan, Italy
- Sara Foresti, Giuseppe Persiano:
Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings. Lecture Notes in Computer Science 10052, 2016, ISBN 978-3-319-48964-3
Cryptanalysis of Symmetric Key
- Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma:
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. 3-18 - Yosuke Todo, Masakatu Morii:
Compact Representation for Division Property. 19-35 - Noor R. Al-Kazaz, Sean A. Irvine, William John Teahan:
An Automatic Cryptanalysis of Transposition Ciphers Using Compression. 36-52
SideChannel Attacks and Implementation
- Serge Vaudenay:
Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. 55-70 - Merrielle Spain, Mayank Varia:
Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis. 71-87 - Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani:
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM. 88-103
Lattice-Based Cryptography
- Khoa Nguyen, Huaxiong Wang, Juanyang Zhang:
Server-Aided Revocable Identity-Based Encryption from Lattices. 107-123 - Patrick Longa, Michael Naehrig:
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. 124-139 - Rachid El Bansarkhani, Jan Sturm:
An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins. 140-155
Virtual Private Network
- Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk:
Breaking PPTP VPNs via RADIUS Encryption. 159-175 - Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan:
LEAP: A Next-Generation Client VPN and Encrypted Email Provider. 176-191 - Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo:
Implementation State of HSTS and HPKP in Both Browsers and Servers. 192-207
Signatures and Hash
- David Derler, Stephan Krenn, Daniel Slamanig:
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. 211-227 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Group Signature with Deniability: How to Disavow a Signature. 228-244 - Yusuke Naito:
Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries. 245-261
MultiParty Computation
- Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. 265-283 - Aysajan Abidin, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa:
Efficient Verifiable Computation of XOR for Biometric Authentication. 284-298 - Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine:
Verifiable Message-Locked Encryption. 299-315
Symmetric Cryptography and Authentication
- Jian Zhang, Wen-Ling Wu:
Security of Online AE Schemes in RUP Setting. 319-334 - Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel:
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. 335-349 - Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto:
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. 350-364
System Security
- Jean-Claude Royer, Anderson Santana de Oliveira:
AAL and Static Conflict Detection in Policy. 367-382 - Kirill Belyaev, Indrakshi Ray:
Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. 383-399 - Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi:
Generic Access Control System for Ad Hoc MCC and Fog Computing. 400-415
Functional and Homomorphic Encryption
- Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang:
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. 419-434 - Eunkyung Kim, Mehdi Tibouchi:
FHE Over the Integers and Modular Arithmetic Circuits. 435-450 - Gérald Gavin:
An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization. 451-464
Information Theoretic Security
- Liqun Chen, Thalia M. Laing, Keith M. Martin:
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. 467-483 - Takaaki Mizuki:
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards. 484-499 - Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. 500-517
Malware and Attacks
- Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama:
Evaluation on Malware Classification by Session Sequence of Common Protocols. 521-531 - Faustin Mbol, Jean-Marc Robert, Alireza Sadighian:
An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems. 532-541 - Joash W. J. Tan, Roland H. C. Yap:
Detecting Malware Through Anti-analysis Signals - A Preliminary Study. 542-551 - Radim Ostádal, Petr Svenda, Vashek Matyás:
Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case. 552-561 - Valérie Nachef, Nicolas Marrière, Emmanuel Volte:
Improved Attacks on Extended Generalized Feistel Networks. 562-572 - Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas:
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. 573-582
MultiParty Computation and Functional Encryption
- Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Function-Private Functional Encryption. 585-593 - Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh:
A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption. 594-603 - Satoshi Obana, Maki Yoshida:
An Efficient Construction of Non-Interactive Secure Multiparty Computation. 604-614 - Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa:
An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. 615-625 - Luca Ferretti, Michele Colajanni, Mirco Marchetti:
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. 626-636 - Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. 637-647
Network Security, Privacy, and Authentication
- Tianxiang Dai, Haya Schulmann, Michael Waidner:
DNSSEC Misconfigurations in Popular Domains. 651-660 - Vicenç Torra, Guillermo Navarro-Arribas:
Integral Privacy. 661-669 - Yu Pu, Jens Grossklags:
Sharing Is Caring, or Callous? 670-680 - Filipe Beato, Kimmo Halunen, Bart Mennink:
Improving the Sphinx Mix Network. 681-691 - Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman:
User Authentication from Mouse Movement Data Using SVM Classifier. 692-700 - Mathilde Igier, Serge Vaudenay:
Distance Bounding Based on PUF. 701-710
Posters
- Tassos Dimitriou, Naser Al-Ibrahim:
Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. 713-718 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
Range Query Integrity in Cloud Data Streams with Efficient Insertion. 719-724 - Kai Simon:
Vulnerability Analysis Using Google and Shodan. 725-730 - Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool:
Language-Based Hypervisors. 731-736 - Giuseppe Aceto, Antonio Montieri, Antonio Pescapè:
Internet Censorship in Italy: A First Look at 3G/4G Networks. 737-742 - Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel:
A Privacy-Preserving Model for Biometric Fusion. 743-748 - Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. 749-754 - Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia:
Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. 755-760
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.