Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

  • Raphaël C.-W. Phan
  • Moti Yung
Conference proceedings Mycrypt 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10311)

Also part of the Security and Cryptology book sub series (LNSC, volume 10311)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Keynotes

    1. Front Matter
      Pages 1-1
  3. Revisiting Tradition

    1. Front Matter
      Pages 19-19
    2. Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar
      Pages 21-55
    3. Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So
      Pages 56-82
  4. Different Paradigms

    1. Front Matter
      Pages 109-109
    2. Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines
      Pages 111-126
    3. Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache
      Pages 127-144
    4. Michal Kulis, Pawel Lorek, Filip Zagorski
      Pages 145-167
  5. Cryptofication

    1. Front Matter
      Pages 169-169
    2. Setareh Sharifian, Reihaneh Safavi-Naini, Fuchun Lin
      Pages 171-192
    3. Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
      Pages 193-211
  6. Malicious Cryptography

    1. Front Matter
      Pages 213-213
    2. Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski
      Pages 215-232
    3. Herman Galteland, Kristian Gjøsteen
      Pages 233-251
    4. Mirosław Kutyłowski, Jacek Cichoń, Lucjan Hanzlik, Kamil Kluczniak, Xiaofeng Chen, Jianfeng Wang
      Pages 252-274
  7. Advances in Cryptanalysis

    1. Front Matter
      Pages 275-275
    2. Marine Minier, Raphaël C.-W. Phan
      Pages 294-320
    3. Emmanuel Volte, Valérie Nachef, Nicolas Marrière
      Pages 321-344
  8. Primitives and Features

    1. Front Matter
      Pages 345-345
    2. Afonso Arriaga, Vincenzo Iovino, Qiang Tang
      Pages 347-363
    3. Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
      Pages 364-388
    4. Britta Hale, Christopher Carr, Danilo Gligoroski
      Pages 389-408
  9. Cryptanalysis Correspondence

    1. Front Matter
      Pages 461-461
    2. Herman Galteland, Stig F. Mjølsnes, Ruxandra F. Olimid
      Pages 463-473
    3. Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng
      Pages 474-477
  10. Invited and Insight Papers

    1. Front Matter
      Pages 479-479
    2. Goichiro Hanaoka
      Pages 481-484
    3. Claude Crépeau, Nan Yang
      Pages 485-493
    4. Houda Ferradi, Rémi Géraud, David Naccache
      Pages 494-505
    5. Ryo Nishimaki
      Pages 521-543
  11. Back Matter
    Pages 573-573

About these proceedings


This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.



anonymity authentication cryptanalysis cryptographic protocols cryptography cypher implementation delegation of authorities DES intrusion detection privacy Rijndael attacks RSA security engineering signature schemes systems security trust requirements

Editors and affiliations

  • Raphaël C.-W. Phan
    • 1
  • Moti Yung
    • 2
  1. 1.Multimedia University, MMUCyberjayaMalaysia
  2. 2.Snapchat and Columbia UniversityNew YorkUSA

Bibliographic information

Industry Sectors
Finance, Business & Banking
IT & Software