Skip to main content
  • Conference proceedings
  • © 2014

Cryptology and Network Security

13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8813)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): CANS: International Conference on Cryptology and Network Security

Conference proceedings info: CANS 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Bootstrappable Identity-Based Fully Homomorphic Encryption

    • Michael Clear, Ciarán McGoldrick
    Pages 1-19
  3. Proxy Re-encryption with Unforgeable Re-encryption Keys

    • Hui Guo, Zhenfeng Zhang, Jiang Zhang
    Pages 20-33
  4. On the Lossiness of 2k-th Power and the Instantiability of Rabin-OAEP

    • Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
    Pages 34-49
  5. Breaking and Fixing Cryptophia’s Short Combiner

    • Bart Mennink, Bart Preneel
    Pages 50-63
  6. FFT Key Recovery for Integral Attack

    • Yosuke Todo, Kazumaro Aoki
    Pages 64-81
  7. New Second Preimage Attack Variants against the MD-Structure

    • Tuomas Kortelainen, Juha Kortelainen
    Pages 98-110
  8. Negotiating DNSSEC Algorithms over Legacy Proxies

    • Amir Herzberg, Haya Shulman
    Pages 111-126
  9. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System

    • Matthias Wachs, Martin Schanzenbach, Christian Grothoff
    Pages 127-142
  10. Universally Composable Oblivious Transfer Based on a Variant of LPN

    • Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento
    Pages 143-158
  11. Converting PKI-Based Authenticated Key Exchange to Identity-Based

    • Koutarou Suzuki, Kazuki Yoneyama
    Pages 159-174
  12. Mining API Calls and Permissions for Android Malware Detection

    • Akanksha Sharma, Subrat Kumar Dash
    Pages 191-205
  13. Direct Anonymous Attestations with Dependent Basename Opening

    • Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré
    Pages 206-221
  14. A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers

    • Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa
    Pages 222-239
  15. Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players

    • Sourya Joyee De, Sushmita Ruj, Asim K. Pal
    Pages 240-255
  16. Attribute-Based Signatures with User-Controlled Linkability

    • Ali El Kaafarani, Liqun Chen, Essam Ghadafi, James Davenport
    Pages 256-269
  17. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards

    • Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
    Pages 270-289
  18. Security of a Privacy-Preserving Biometric Authentication Protocol Revisited

    • Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
    Pages 290-304

Other Volumes

  1. Cryptology and Network Security

About this book

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Editors and Affiliations

  • Department of Informatics, Athens University of Economics & Business, Athens, Greece

    Dimitris Gritzalis

  • Department of Informatics and Telecommunications, Panepistimiopolis, National and Kapodistrian University of Athens, Athens, Greece

    Aggelos Kiayias

  • FORTH-ICS, Vassilika Vouton, Heraklion, Greece

    Ioannis Askoxylakis

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access