×

Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. (English) Zbl 1408.68011

Lecture Notes in Computer Science 11445. Cham: Springer (ISBN 978-3-030-16457-7/pbk; 978-3-030-16458-4/ebook). xix, 482 p. (2019).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1357.68009].
Indexed articles:
Souissi, Youssef; Facon, Adrien; Guilley, Sylvain, Virtual security evaluation. An operational methodology for side-channel leakage detection at source-code level, 3-12 [Zbl 1461.94085]
Takarabt, Sofiane; Schaub, Alexander; Facon, Adrien; Guilley, Sylvain; Sauvage, Laurent; Souissi, Youssef; Mathieu, Yves, Cache-timing attacks still threaten IoT devices, 13-30 [Zbl 1432.94143]
Nguyen, Robert; Facon, Adrien; Guilley, Sylvain; Gautier, Guillaume; El Assad, Safwan, Speed-up of SCA attacks on 32-bit multiplications, 31-39 [Zbl 1432.94141]
Azizi, Abdelmalek, Arabic cryptography and steganography in Morocco, 43-54 [Zbl 1432.94005]
Hell, Martin; Johansson, Thomas; Meier, Willi; Sönnerup, Jonathan; Yoshida, Hirotaka, An AEAD variant of the Grain stream cipher, 55-71 [Zbl 1432.94136]
Kansal, Meenakshi; Dutta, Ratna; Mukhopadhyay, Sourav, Construction for a nominative signature scheme from lattice with enhanced security, 72-91 [Zbl 1432.94138]
Teşeleanu, George, Reinterpreting and improving the cryptanalysis of the Flash Player PRNG, 92-104 [Zbl 1432.94144]
Ding, Jintai; Schmitt, Kevin; Zhang, Zheng, A key exchange based on the short integer solution problem and the learning with errors problem, 105-117 [Zbl 1461.94076]
Iovino, Vincenzo; Visconti, Ivan, Non-interactive zero knowledge proofs in the random oracle model, 118-141 [Zbl 1462.94039]
Zhang, Linru; Chen, Yuechen; Zhang, Jun; He, Meiqi; Yiu, Siu-Ming, From quadratic functions to polynomials: generic functional encryption from standard assumptions, 142-167 [Zbl 1461.94089]
Geihs, Matthias; Schabhüser, Lucas; Buchmann, Johannes, Efficient proactive secret sharing for large data via concise vector commitments, 171-194 [Zbl 1461.94092]
Mehta, Sanyam; Saraswat, Vishal; Sen, Smith, Secret sharing using near-MDS codes, 195-214 [Zbl 1461.94094]
Mesnager, Sihem; Kaytancı, Kübra; Özbudak, Ferruh, On plateaued functions, linear structures and permutation polynomials, 217-235 [Zbl 1464.94086]
Yi, Hairong; Luo, Guiwen; Lin, Dongdai, Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains, 236-253 [Zbl 1461.94088]
Mesnager, Sihem, On good polynomials over finite fields for optimal locally recoverable codes, 257-268 [Zbl 1465.94114]
Lau, Terry Shue Chien; Tan, Chik How, A new Gabidulin-like code and its application in cryptography, 269-287 [Zbl 1465.94109]
Belabssir, Soukaina; Ayebie, Edoukou Berenger; Souidi, El Mamoun, Perfect, Hamming and simplex linear error-block codes with minimum \(\pi\)-distance 3, 288-306 [Zbl 1465.94102]
Boidje, Brice Odilon; Gueye, Cheikh Thiecoumba; Dione, Gilbert Ndollane; Klamti, Jean Belo, Quasi-dyadic Girault identification scheme, 307-321 [Zbl 1461.94074]
Gavin, Gerald; Bonnevay, Stephane, Securely aggregating testimonies with threshold multi-key FHE, 325-348 [Zbl 1461.94077]
Das, Parthasarathi; Jacobson, Michael J. jun.; Scheidler, Renate, Improved efficiency of a linearly homomorphic cryptosystem, 349-368 [Zbl 1461.94075]
Kabatiansky, Grigory, On the tracing traitors math. Dedicated to the memory of Bob Blakley – pioneer of digital fingerprinting and inventor of secret sharing, 371-380 [Zbl 1461.94079]
Wang, Yongge; Malluhi, Qutaibah M., Reusable garbled Turing machines without FHE, 381-398 [Zbl 1524.68130]
Yan, Jingchen; Wang, Yating; Goto, Yuichi; Cheng, Jingde, An extension of formal analysis method with reasoning: a case study of flaw detection for non-repudiation and fairness, 399-408 [Zbl 1461.94087]
Sarr, Augustin P.; Seye, Papa B.; Ngarenon, Togdé, A practical and insider secure signcryption with non-interactive non-repudiation, 409-429 [Zbl 1461.94096]
El Hajji, Said; Moukafih, Nabil; Orhanou, Ghizlane, Analysis of neural network training and cost functions impact on the accuracy of IDS and SIEM Systems, 433-451 [Zbl 1494.68034]
Teşeleanu, George, Managing your kleptographic subscription plan, 452-461 [Zbl 1461.94098]
Cabodi, Gianpiero; Camurati, Paolo; Finocchiaro, Fabrizio; Vendraminetto, Danilo, Model checking speculation-dependent security properties: abstracting and reducing processor models for sound and complete verification, 462-479 [Zbl 1524.68040]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68P25 Data encryption (aspects in computer science)
68P30 Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science)
94A60 Cryptography
94Bxx Theory of error-correcting codes and error-detecting codes
00B25 Proceedings of conferences of miscellaneous specific interest
00B30 Festschriften

Biographic References:

el Hajji, Said

Citations:

Zbl 1357.68009
PDFBibTeX XMLCite
Full Text: DOI