Skip to main content
  • Conference proceedings
  • © 2013

Cryptology and Network Security

12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings

  • Up to date results
  • Fast track conference proceedings
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8257)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Cryptanalysis I

    1. Differential Attacks on Generalized Feistel Schemes

      • Valérie Nachef, Emmanuel Volte, Jacques Patarin
      Pages 1-19
  3. Zero-Knowledge Protocols

    1. Zero Knowledge Proofs from Ring-LWE

      • Xiang Xie, Rui Xue, Minqian Wang
      Pages 57-73
    2. Zero Knowledge with Rubik’s Cubes and Non-abelian Groups

      • Emmanuel Volte, Jacques Patarin, Valérie Nachef
      Pages 74-91
    3. Efficient Modular NIZK Arguments from Shift and Product

      • Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang
      Pages 92-121
  4. Distributed Protocols

    1. Achieving Correctness in Fair Rational Secret Sharing

      • Sourya Joyee De, Asim K. Pal
      Pages 139-161
  5. Network Security and Applications

    1. Resource Access Control in the Facebook Model

      • Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias
      Pages 179-198
    2. Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture

      • Babins Shrestha, Nitesh Saxena, Justin Harrison
      Pages 199-217
  6. Advanced Cryptographic Primitives

    1. Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions

      • Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu
      Pages 235-250
  7. Cryptanalysis II

    1. Truncated Differential Analysis of Reduced-Round LBlock

      • Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld
      Pages 291-308
  8. Verifiable Computation

    1. How to Update Documents Verifiably in Searchable Symmetric Encryption

      • Kaoru Kurosawa, Yasuhiro Ohtaki
      Pages 309-328
  9. Back Matter

Other Volumes

  1. Cryptology and Network Security

About this book

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.

The 18 revised full papers presented together with four invited talks were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on cryptanalysis, zero-knowledge protocols, distributed protocols, network security and applications, advanced cryptographic primitives, and verifiable computation.

Editors and Affiliations

  • École Normale Supérieure and CNRS,, Paris, France

    Michel Abdalla

  • Department of Computer Science, Purdue University, West Lafayette, USA

    Cristina Nita-Rotaru

  • Institute of Computing, University of Campinas, Campinas, Brazil

    Ricardo Dahab

Bibliographic Information

  • Book Title: Cryptology and Network Security

  • Book Subtitle: 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings

  • Editors: Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-02937-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2013

  • Softcover ISBN: 978-3-319-02936-8Published: 23 October 2013

  • eBook ISBN: 978-3-319-02937-5Published: 30 October 2013

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVIII, 349

  • Number of Illustrations: 52 b/w illustrations

  • Topics: Cryptology, Systems and Data Security, Computer Communication Networks, Coding and Information Theory

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access