Description |
1 online resource (xviii, 349 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 8257 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8257. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Cryptanalysis I. Differential Attacks on Generalized Feistel Schemes / Valérie Nachef, Emmanuel Volte and Jacques Patarin -- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation / Bo Zhu, Yin Tan and Guang Gong -- Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? / Si Gao, Hua Chen and Limin Fan -- Zero-Knowledge Protocols. Zero Knowledge Proofs from Ring-LWE / Xiang Xie, Rui Xue and Minqian Wang -- Zero Knowledge with Rubik's Cubes and Non-abelian Groups / Emmanuel Volte, Jacques Patarin and Valérie Nachef -- Efficient Modular NIZK Arguments from Shift and Product / Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang -- Distributed Protocols. Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model / Yong Li and Zheng Yang -- Achieving Correctness in Fair Rational Secret Sharing / Sourya Joyee De and Asim K. Pal -- Network Security and Applications. BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis / Nizar Kheir and Chirine Wolley -- Resource Access Control in the Facebook Model / Konstantinos Chronopoulos, Maria Gouseti and Aggelos Kiayias -- Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture / Babins Shrestha, Nitesh Saxena and Justin Harrison -- Advanced Cryptographic Primitives. Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition / Mihir Bellare and Adam O'Neill -- Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions / Haiyang Xue [and others] -- Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions / Veronika Kuchta and Mark Manulis -- Cryptanalysis II. A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher / Tomer Ashur and Orr Dunkelman -- Truncated Differential Analysis of Reduced-Round LBlock / Sareh Emami [and others] -- Verifiable Computation. How to Update Documents Verifiably in Searchable Symmetric Encryption / Kaoru Kurosawa and Yasuhiro Ohtaki -- Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps / Liang Feng Zhang and Reihaneh Safavi-Naini |
Summary |
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation |
Analysis |
computerwetenschappen |
|
computer sciences |
|
informatietheorie |
|
information theory |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Notes |
International conference proceedings |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013) |
Subject |
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Abdalla, Michel, editor
|
|
Nita-Rotaru, Cristina, editor
|
|
Dahab, Ricardo, editor
|
ISBN |
9783319029375 |
|
3319029371 |
|
3319029363 |
|
9783319029368 |
|