CALL FOR PARTICIPATION ****************************************************************************** 15th International Conference on Cryptology and Network Security (CANS 2016) Milan (historic area, near Duomo), Italy -- 14-16 November 2016 http://cans2016.di.unimi.it/ ******************************************************************************
ABOUT THE CONFERENCE The International Conference on Cryptology and Network Security (CANS) is a recognized annual conference, focusing on all aspects of cryptology, and of data, network, and computer security, attracting cutting-edge results from world-renowned scientists in the area. CANS 2016 is the 15th conference in this series and will be held in Milan, Italy. The conference will be a 3-day event, featuring 2 keynotes, 30 full papers, 18 short papers, and 8 posters. REGISTRATION Registration information is available at: http://cans2016.di.unimi.it/registration --------------------------- PROGRAM --------------------------- MONDAY - NOVEMBER 14, 2016 09.15 - 09.30: Opening 09.30 - 10.30: Keynote 10.30 - 11.00: Coffee Break 11.00 - 12.30: Session 1A - Cryptanalysis of Symmetric Key (Napoleonica Room) Session 1B - SideChannel Attacks and Implementation (Verde Room) 12.30 - 14.00: Lunch 14.00 - 15.30: Session 2A - Lattice-Based Cryptography (Napoleonica Room) Session 2B - Virtual Private Network (Verde Room) 15.30 - 16.00: Coffee Break 16.00 - 18.00: Session 3A - Malware and Attacks (Napoleonica Room) Session 3B - MultiParty Computation and Functional Encryption (Verde Room) TUESDAY, NOVEMBER 15, 2016 09.30 - 10.30: Keynote 10.30 - 11.00: Coffee Break 11.00 - 12.30: Session 4A - Signatures and Hash (Napoleonica Room) Session 4B - MultiParty Computation (Verde Room) 12.30 - 14.00: Lunch 14.00 - 15.30: Session 5A - Symmetric Cryptography and Authentication (Napoleonica Room) Session 5B - System Security (Verde Room) 15.30 - 16.00: Coffee Break 16.00 - 17.30: Session 6A - Functional and Homomorphic Encryption (Napoleonica Room) Session 6B - Information Theoretic Security (Verde Room) WEDNESDAY - NOVEMBER 16, 2016 09.00 - 11.00: Session 7 - Network Security, Privacy, and Authentication (Napoleonica Room) 11.00 - 11.30: Coffee Break 11.30 - 13.00: Session 8 - Posters (Napoleonica Room) --------------------------- MONDAY - NOVEMBER 14, 2016 --------------------------- Session 1A - Cryptanalysis of Symmetric Key (Chair: Bart Mennink) 11.00 - 12.30 Napoleonica Room - Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, and Xiangliang Ma - Compact Representation for Division Property Yosuke Todo and Masakatu Morii - An Automatic Cryptanalysis of Transposition Ciphers Using Compression Noor R. Al-Kazaz, Sean A. Irvine, and William J. Teahan Session 1B - SideChannel Attacks and Implementation (Chair: Mehdi Tibouchi) 11.00 - 12.30 Verde Room - Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra Serge Vaudenay - Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis Merrielle Spain and Mayank Varia - NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, and Mehran Mozaffari-Kermani Session 2A - Lattice-Based Cryptography 14.00 - 15.30 Napoleonica Room - Server-Aided Revocable Identity-Based Encryption from Lattices Khoa Nguyen, Huaxiong Wang, and Juanyang Zhang - Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography Patrick Longa and Michael Naehrig - An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins Rachid El Bansarkhani and Jan Sturm Session 2B - Virtual Private Network (Chair: Amir Herzberg) 14.00 - 15.30 Verde Room - Breaking PPTP VPNs via RADIUS Encryption Matthias Horst, Martin Grothe, Tibor Jager, and J¨org Schwenk - LEAP: A Next-Generation Client VPN and Encrypted Email Provider Elijah Sparrow, Harry Halpin, Kali Kaneko, and Ruben Pollan - Implementation State of HSTS and HPKP in Both Browsers and Servers Sergio de los Santos, Carmen Torrano, Yaiza Rubio, and Felix Brezo Session 3A - Malware and Attacks (Chair: Indrakshi Ray) 16.00 - 18.00 Napoleonica Room - Evaluation on Malware Classification by Session Sequence of Common Protocols Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, and Mitsuaki Akiyama - An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems Faustin Mbol, Jean-Marc Robert, and Alireza Sadighian - Detecting Malware Through Anti-Analysis Signals - A Preliminary Study Joash W.J. Tan and Roland H.C. Yap - Attackers in Wireless Sensor Networks Will Be Neither Random nor Jumping – Secrecy Amplification Case Radim Ostadal, Petr Svenda, and Vashek Matyas - Improved Attacks on Extended Generalized Feistel Networks Valerie Nachef, Nicolas Marriere, and Emmanuel Volte - When Constant-time Source Yields Variable-Time Binary: Exploiting Curve25519-Donna Built with MSVC 2015 Thierry Kaufmann, Herve Pelletier, Serge Vaudenay, and Karine Villegas Session 3B - MultiParty Computation and Functional Encryption 16.00 - 18.00 Verde Room - On the Power of Public-key Function-Private Functional Encryption Vincenzo Iovino, Qiang Tang, and Karol Zebrowski - A New Technique for Compacting Secret Key in Attribute-based Broadcast Encryption Sebastien Canard, Duong Hieu Phan, and Viet Cuong Trinh - An Efficient Construction of Non-Interactive Secure Multiparty Computation Satoshi Obana and Maki Yoshida - An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, and Mustafa A. Mustafa - Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators Luca Ferretti, Michele Colajanni, and Mirco Marchetti - Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, and Bo-Yin Yang -------------------------- TUESDAY, NOVEMBER 15, 2016 -------------------------- Session 4A - Signatures and Hash (Chair: Francesco Buccafurri) 11.00 - 12.30 Napoleonica Room - Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing David Derler, Stephan Krenn, and Daniel Slamanig - Group Signature with Deniability: How to Disavow a Signature Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka - Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries Yusuke Naito Session 4B - MultiParty Computation (Chair: Ming Li) 11.00 - 12.30 Verde Room - Secure Error-Tolerant Graph Matching Protocols Kalikinkar Mandal, Basel Alomair, and Radha Poovendran - Efficient Verifiable Computation of XOR for Biometric Authentication Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rua, and Aikaterini Mitrokotsa - Verifiable Message-Locked Encryption Sebastien Canard, Fabien Laguillaumie, and Marie Paindavoine Session 5A - Symmetric Cryptography and Authentication 14.00 - 15.30 Napoleonica Room - Security of Online AE Schemes in RUP Setting Jian Zhang and Wenling Wu - An Efficient Entity Authentication Protocol With Enhanced Security and Privacy Properties Aysajan Abidin, Enrique Argones Rua, and Bart Preneel - Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, and Mitsugu Iwamoto Session 5B - System Security (Chair: Roland Yap) 14.00 - 15.30 Verde Room - AAL and Static Conflict Detection in Policy Jean-Claude Royer and Anderson Santana De Oliveira - Component-Oriented Access Control for Deployment of Application Services in Containerized Environments Kirill Belyaev and Indrakshi Ray - Generic Access Control System for Ad Hoc MCC and Fog Computing Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, and Wafa Harizi Session 6A - Functional and Homomorphic Encryption (Chair: Mayank Varia) 16.00 - 17.30 Napoleonica Room - SecReach: Secure Reachability Computation on Encrypted Location Check-in Data Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, and Yuqing Zhang - FHE over the Integers and Modular Arithmetic Circuits Eunkyung Kim and Mehdi Tibouchi - An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization Gerald Gavin Session 6B - Information Theoretic Security 16.00 - 17.30 Verde Room - Efficient, XOR-based, Ideal (t, n)−Threshold Schemes Liqun Chen, Thalia M. Laing, and Keith M. Martin - Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards Takaaki Mizuki - Efficient Card-based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, and Kazuo Ohta ----------------------------- WEDNESDAY - NOVEMBER 16, 2016 ----------------------------- Session 7 - Network Security, Privacy, and Authentication (Chair: Giuseppe Aceto) 09.00 - 11.00 Napoleonica Room - Improving the Sphinx Mix Network Filipe Beato, Kimmo Halunen, and Bart Mennink - DNSSEC Misconfigurations in Popular Domains Tianxiang Dai, Haya Shulman, and Michael Waidner - Integral Privacy Vicenc Torra and Guillermo Navarro-Arribas - Sharing is Caring, or Callous? Yu Pu and Jens Grossklags - User Authentication from Mouse Movement Data using SVM Classifier Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, and Md Hasanuzzaman - Distance Bounding based on PUF Mathilde Igier and Serge Vaudenay Session 8 - Posters 11.30 - 13.00 Napoleonica Room - Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services Tassos Dimitriou and Naser Al-Ibrahim - Range Query Integrity in Cloud Data Streams With Efficient Insertion Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, and Antonino Nocera - Vulnerability analysis using Google and Shodan Kai Simon - Language-Based Hypervisors Enrico Budianto, Richard Chow, Jonathan Ding, and Michael McCool - Internet Censorship in Italy: a First Look at 3G/4G Networks Giuseppe Aceto, Antonio Montieri, and Antonio Pescape - A Privacy-Preserving Model for Biometric Fusion Christina-Angeliki Toli, Abdelrahaman Aly, and Bart Preneel - Hybrid WBC: Secure and Efficient White-Box Encryption Schemes Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, and Aviya Vaidberg - Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, and Mayank Varia _______________________________________________ Om-announce mailing list [email protected] http://openmath.org/mailman/listinfo/om-announce
