The proceedings of CANS 2016 are available here.

Monday, November 14, 2016

9.15 - 9.30: Opening (Room: Sala Napoleonica)

9.30 - 10.30: Keynote (Room: Sala Napoleonica)

Amir Herzberg, Bar-Ilan University, Israel
Privacy, Economy - and Cryptography?
Abstract and Short Bio

10.30 - 11.00: Coffee Break

11.00 - 12.30: Morning Session

Session 1A: Cryptanalysis of Symmetric Key (Room: Sala Napoleonica, Chair: Bart Mennink)

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers
Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, and Xiangliang Ma

Compact Representation for Division Property
Yosuke Todo and Masakatu Morii

An Automatic Cryptanalysis of Transposition Ciphers Using Compression
Noor R. Al-Kazaz, Sean A. Irvine, and William J. Teahan
Session 1B: SideChannel Attacks and Implementation (Room: Sala Verde, Chair: Mehdi Tibouchi)

Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra
Serge Vaudenay

Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis
Merrielle Spain and Mayank Varia

NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM
Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, and Mehran Mozaffari-Kermani

12.30 - 14.00: Lunch Break

14.00 - 15.30: First Afternoon Session

Session 2A: Lattice-Based Cryptography (Room: Sala Napoleonica, Chair: David Jao)

Server-Aided Revocable Identity-Based Encryption from Lattices
Khoa Nguyen, Huaxiong Wang, and Juanyang Zhang

Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography
Patrick Longa and Michael Naehrig

An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins
Rachid El Bansarkhani and Jan Sturm
Session 2B: Virtual Private Network (Room: Sala Verde, Chair: Amir Herzberg)

Breaking PPTP VPNs via RADIUS Encryption
Matthias Horst, Martin Grothe, Tibor Jager, and Jörg Schwenk

LEAP: A Next-Generation Client VPN and Encrypted Email Provider
Elijah Sparrow, Harry Halpin, Kali Kaneko, and Ruben Pollan

Implementation State of HSTS and HPKP in Both Browsers and Servers
Sergio de los Santos, Carmen Torrano, Yaiza Rubio, and Félix Brezo

15.30 - 16.00: Coffee Break

16.00 - 18.00: Second Afternoon Session

Session 3A: Malware and Attacks (Room: Sala Napoleonica, Chair: Indrakshi Ray)

Evaluation on Malware Classification by Session Sequence of Common Protocols
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, and Mitsuaki Akiyama

An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems
Faustin Mbol, Jean-Marc Robert, and Alireza Sadighian

Detecting Malware Through Anti-Analysis Signals - A Preliminary Study
Joash W.J. Tan and Roland H.C. Yap

Attackers in Wireless Sensor Networks Will Be Neither Random nor Jumping – Secrecy Amplification Case
Radim Oštádal, Petr Švenda, and Vashek Matyáš

Improved Attacks on Extended Generalized Feistel Networks
Valérie Nachef, Nicolas Marrière, and Emmanuel Volte

When Constant-time Source Yields Variable-Time Binary: Exploiting Curve25519-Donna Built with MSVC 2015
Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, and Karine Villegas
Session 3B: MultiParty Computation and Functional Encryption (Room: Sala Verde)

On the Power of Public-key Function-Private Functional Encryption
Vincenzo Iovino, Qiang Tang, and Karol Zebrowski

A New Technique for Compacting Secret Key in Attribute-based Broadcast Encryption
Sébastien Canard, Duong Hieu Phan, and Viet Cuong Trinh

An Efficient Construction of Non-Interactive Secure Multiparty Computation
Satoshi Obana and Maki Yoshida

An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market
Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, and Mustafa A. Mustafa

Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators
Luca Ferretti, Michele Colajanni, and Mirco Marchetti

Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation
Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, and Bo-Yin Yang

18.00: Cocktail

Tuesday, November 15, 2016

9.30 - 10.30: Keynote (Room: Sala Napoleonica)

David Pointcheval, ENS Paris, France
Efficient Private Disjointness Testing

10.30 - 11.00: Coffee Break

11.00 - 12.30: Morning Session

Session 4A: Signatures and Hash (Room: Sala Napoleonica, Chair: Francesco Buccafurri)

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing
David Derler, Stephan Krenn, and Daniel Slamanig

Group Signature with Deniability: How to Disavow a Signature
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka

Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries
Yusuke Naito
Session 4B: MultiParty Computation (Room: Sala Verde, Chair: Ming Li)

Secure Error-Tolerant Graph Matching Protocols
Kalikinkar Mandal, Basel Alomair, and Radha Poovendran

Efficient Verifiable Computation of XOR for Biometric Authentication
Aysajan Abidin, Abdelrahaman Aly, Enrique Argones Rúa, and Aikaterini Mitrokotsa

Verifiable Message-Locked Encryption
Sébastien Canard, Fabien Laguillaumie, and Marie Paindavoine

12.30 - 14.00: Lunch Break

14.00 - 15.30: First Afternoon Session

Session 5A: Symmetric Cryptography and Authentication (Room: Sala Napoleonica, Chair: Zbigniew S. Szewczak)

Security of Online AE Schemes in RUP Setting
Jian Zhang and Wenling Wu

An Efficient Entity Authentication Protocol With Enhanced Security and Privacy Properties
Aysajan Abidin, Enrique Argones Rúa, and Bart Preneel

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, and Mitsugu Iwamoto
Session 5B: System Security (Room: Sala Verde, Chair: Roland Yap)

AAL and Static Conflict Detection in Policy
Jean-Claude Royer and Anderson Santana De Oliveira

Component-Oriented Access Control for Deployment of Application Services in Containerized Environments
Kirill Belyaev and Indrakshi Ray

Generic Access Control System for Ad Hoc MCC and Fog Computing
Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, and Wafa Harizi

15.30 - 16.00: Coffee Break

16.00 - 17.30: Second Afternoon Session

Session 6A: Functional and Homomorphic Encryption (Room: Sala Napoleonica, Chair: Mayank Varia)

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, and Yuqing Zhang

FHE over the Integers and Modular Arithmetic Circuits
Eunkyung Kim and Mehdi Tibouchi

An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization
Gérald Gavin
Session 6B: Information Theoretic Security (Room: Sala Verde, Chair: Vincenzo Iovino)

Efficient, XOR-based, Ideal (t, n)−Threshold Schemes
Liqun Chen, Thalia M. Laing, and Keith M. Martin

Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
Takaaki Mizuki

Efficient Card-based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations
Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, and Kazuo Ohta

19.30: Social Dinner

L'Isola Dei Sapori
via Via Augusto Anfossi, 10 - Milano
Walk directions

Wednesday, November 16, 2016

9.00 - 11.00: First Morning Session

Session 7: Network Security, Privacy, and Authentication (Room: Sala Napoleonica, Chair: Giuseppe Aceto)

Improving the Sphinx Mix Network
Filipe Beato, Kimmo Halunen, and Bart Mennink

DNSSEC Misconfigurations in Popular Domains
Tianxiang Dai, Haya Shulman, and Michael Waidner

Integral Privacy
Vicenç Torra and Guillermo Navarro-Arribas

Sharing is Caring, or Callous?
Yu Pu and Jens Grossklags

User Authentication from Mouse Movement Data using SVM Classifier
Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, and Md Hasanuzzaman

Distance Bounding based on PUF
Mathilde Igier and Serge Vaudenay

11.00 - 11.30: Coffee Break

11.30 - 13.00: Second Morning Session

Session 8: Posters (Room: Sala Napoleonica, Chair: Vicenç Torra)

Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services
Tassos Dimitriou and Naser Al-Ibrahim

Range Query Integrity in Cloud Data Streams With Efficient Insertion
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, and Antonino Nocera

Vulnerability analysis using Google and Shodan
Kai Simon

Language-Based Hypervisors
Enrico Budianto, Richard Chow, Jonathan Ding, and Michael McCool

Internet Censorship in Italy: a First Look at 3G/4G Networks
Giuseppe Aceto, Antonio Montieri, and Antonio Pescapè

A Privacy-Preserving Model for Biometric Fusion
Christina-Angeliki Toli, Abdelrahaman Aly, and Bart Preneel

Hybrid WBC: Secure and Efficient White-Box Encryption Schemes
Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, and Aviya Vaidberg

Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments
Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, and Mayank Varia