Limit search to available items
Book Cover
E-book
Author International Conference on Cryptology and Network Security (12th : 2013 : Parati, Brazil)

Title Cryptology and network security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings / Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab (eds.)
Published Cham : Springer, 2013

Copies

Description 1 online resource (xviii, 349 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 8257
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8257. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Cryptanalysis I. Differential Attacks on Generalized Feistel Schemes / Valérie Nachef, Emmanuel Volte and Jacques Patarin -- Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation / Bo Zhu, Yin Tan and Guang Gong -- Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? / Si Gao, Hua Chen and Limin Fan -- Zero-Knowledge Protocols. Zero Knowledge Proofs from Ring-LWE / Xiang Xie, Rui Xue and Minqian Wang -- Zero Knowledge with Rubik's Cubes and Non-abelian Groups / Emmanuel Volte, Jacques Patarin and Valérie Nachef -- Efficient Modular NIZK Arguments from Shift and Product / Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang -- Distributed Protocols. Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model / Yong Li and Zheng Yang -- Achieving Correctness in Fair Rational Secret Sharing / Sourya Joyee De and Asim K. Pal -- Network Security and Applications. BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis / Nizar Kheir and Chirine Wolley -- Resource Access Control in the Facebook Model / Konstantinos Chronopoulos, Maria Gouseti and Aggelos Kiayias -- Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture / Babins Shrestha, Nitesh Saxena and Justin Harrison -- Advanced Cryptographic Primitives. Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition / Mihir Bellare and Adam O'Neill -- Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions / Haiyang Xue [and others] -- Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions / Veronika Kuchta and Mark Manulis -- Cryptanalysis II. A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher / Tomer Ashur and Orr Dunkelman -- Truncated Differential Analysis of Reduced-Round LBlock / Sareh Emami [and others] -- Verifiable Computation. How to Update Documents Verifiably in Searchable Symmetric Encryption / Kaoru Kurosawa and Yasuhiro Ohtaki -- Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps / Liang Feng Zhang and Reihaneh Safavi-Naini
Summary This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013. The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation
Analysis computerwetenschappen
computer sciences
informatietheorie
information theory
gegevensbeheer
data management
computernetwerken
computer networks
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed November 4, 2013)
Subject Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Computer security
Computer networks
Computer networks -- Security measures
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Abdalla, Michel, editor
Nita-Rotaru, Cristina, editor
Dahab, Ricardo, editor
ISBN 9783319029375
3319029371
3319029363
9783319029368
Other Titles CANS 2013