This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.
The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.