Cryptology and network security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings /

Saved in:
Bibliographic Details
Meeting name:International Conference on Cryptology and Network Security (12th : 2013 : Parati, Brazil)
Imprint:Cham : Springer, 2013.
Description:1 online resource (xviii, 349 pages) : illustrations.
Language:English
Series:Lecture Notes in Computer Science, 0302-9743 ; 8257
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8257.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11081951
Hidden Bibliographic Details
Varying Form of Title:CANS 2013
Other authors / contributors:Abdalla, Michel, editor.
Nita-Rotaru, Cristina, editor.
Dahab, Ricardo, editor.
ISBN:9783319029375
3319029371
3319029363
9783319029368
9783319029368
Notes:International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013).
Summary:This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.
Other form:Printed edition: 9783319029368
Standard no.:10.1007/978-3-319-02937-5
Table of Contents:
  • Cryptanalysis I. Differential Attacks on Generalized Feistel Schemes / Valérie Nachef, Emmanuel Volte and Jacques Patarin
  • Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation / Bo Zhu, Yin Tan and Guang Gong
  • Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? / Si Gao, Hua Chen and Limin Fan
  • Zero-Knowledge Protocols. Zero Knowledge Proofs from Ring-LWE / Xiang Xie, Rui Xue and Minqian Wang
  • Zero Knowledge with Rubik's Cubes and Non-abelian Groups / Emmanuel Volte, Jacques Patarin and Valérie Nachef
  • Efficient Modular NIZK Arguments from Shift and Product / Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang
  • Distributed Protocols. Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model / Yong Li and Zheng Yang
  • Achieving Correctness in Fair Rational Secret Sharing / Sourya Joyee De and Asim K. Pal
  • Network Security and Applications. BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis / Nizar Kheir and Chirine Wolley
  • Resource Access Control in the Facebook Model / Konstantinos Chronopoulos, Maria Gouseti and Aggelos Kiayias
  • Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture / Babins Shrestha, Nitesh Saxena and Justin Harrison
  • Advanced Cryptographic Primitives. Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition / Mihir Bellare and Adam O'Neill
  • Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions / Haiyang Xue [and others]
  • Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions / Veronika Kuchta and Mark Manulis
  • Cryptanalysis II. A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher / Tomer Ashur and Orr Dunkelman
  • Truncated Differential Analysis of Reduced-Round LBlock / Sareh Emami [and others]
  • Verifiable Computation. How to Update Documents Verifiably in Searchable Symmetric Encryption / Kaoru Kurosawa and Yasuhiro Ohtaki
  • Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps / Liang Feng Zhang and Reihaneh Safavi-Naini.