×

Codes, cryptology and information security. Second international conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017. Proceedings – in honor of Claude Carlet. (English) Zbl 1357.68009

Lecture Notes in Computer Science 10194. Cham: Springer (ISBN 978-3-319-55588-1/pbk; 978-3-319-55589-8/ebook). xii, 384 p. (2017).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1316.68010].
Indexed articles:
Budaghyan, Lilya; Helleseth, Tor; Li, Nian; Sun, Bo, Some results on the known classes of quadratic APN functions, 3-16 [Zbl 1365.94409]
García-Planas, M. Isabel, Families of convolutional codes over finite fields: a survey, 17-34 [Zbl 1365.94538]
Guilley, Sylvain; Heuser, Annelie; Rioul, Olivier, Codes for side-channel attacks and protections, 35-55 [Zbl 1365.94430]
Bennasar, H.; Bendahmane, A.; Essaaidi, M., An overview of the state-of-the-art of cloud computing cyber-security, 56-67 [Zbl 1485.68016]
Bonnoron, Guillaume; Fontaine, Caroline; Gogniat, Guy; Herbert, Vincent; Lapôtre, Vianney; Migliore, Vincent; Roux-Langlois, Adeline, Somewhat/fully homomorphic encryption: implementation progresses and challenges, 68-82 [Zbl 1365.94407]
Ciss, Abdoul Aziz; Sow, Djiby, Two-source randomness extractors for elliptic curves for authenticated key exchange, 85-95 [Zbl 1364.94532]
Gueye, Cheikh Thiécoumba; Klamti, Jean Belo; Hirose, Shoichi, Generalization of BJMM-ISD using May-Ozerov nearest neighbor algorithm over an arbitrary finite field \(\mathbb{F}_q\), 96-109 [Zbl 1365.94429]
Ding, Cunsheng; Zhou, Zhengchun, Parameters of 2-designs from some BCH codes, 110-127 [Zbl 1365.94555]
Elkhadir, Zyad; Chougdali, Khalid; Benattou, Mohammed, A median nearest neighbors LDA for anomaly network detection, 128-141 [Zbl 1365.62235]
Struck, Patrick; Schabhüser, Lucas; Demirel, Denise; Buchmann, Johannes, Linearly homomorphic authenticated encryption with provable correctness and public verifiability, 142-160 [Zbl 1485.68093]
Batoul, Aicha; Guenda, Kenza; Gulliver, T. Aaron; Aydin, Nuh, Constacyclic codes over finite principal ideal rings, 161-175 [Zbl 1365.94549]
Batoul, Aicha; Guenda, Kenza; Gulliver, T. Aaron; Aydin, Nuh, On isodual cyclic codes over finite chain rings, 176-194 [Zbl 1365.94550]
Ikematsu, Yasuhiko; Duong, Dung H.; Petzoldt, Albrecht; Takagi, Tsuyoshi, Revisiting the efficient key generation of ZHFE, 195-212 [Zbl 1406.94064]
Vega, Gerardo; Cuén-Ramos, Jesús E., The weight distribution for an extended family of reducible cyclic codes, 213-229 [Zbl 1365.94564]
Berger, Thierry P.; Gueye, Cheikh Thiécoumba; Klamti, Jean Belo, A NP-complete problem in coding theory with application to code based cryptography, 230-237 [Zbl 1365.94501]
Guillot, Philippe; Millérioux, Gilles; Dravie, Brandon; El Mrabet, Nadia, Spectral approach for correlation power analysis, 238-253 [Zbl 1365.94431]
Cayrel, Pierre-Louis; Gueye, Cheikh Thiecoumba; Mboup, El Hadji Modou; Ndiaye, Ousmane; Persichetti, Edoardo, Efficient implementation of hybrid encryption from coding theory, 254-264 [Zbl 1365.94413]
Wu, Teng; Tan, Yin; Mandal, Kalikinkar; Gong, Guang, On the multi-output filtering model and its applications, 265-281 [Zbl 1365.94465]
Mesnager, Sihem; Ongan, Pınar; Özbudak, Ferruh, New bent functions from permutations and linear translators, 282-297 [Zbl 1408.94949]
Zhang, F.; Pasalic, E.; Cepak, N.; Wei, Y., Bent functions in \(\mathcal C\) and \(\mathcal D\) outside the completed Maiorana-McFarland class, 298-313 [Zbl 1408.94972]
Gangopadhyay, Sugata; Maitra, Subhamoy; Sinha, Nishant; Stănică, Pantelimon, Quantum algorithms related to \(HN\)-transforms of Boolean functions, 314-327 [Zbl 1420.94123]
Carlet, Claude; Mesnager, Sihem; Özbudak, Ferruh; Sınak, Ahmet, Explicit characterizations for plateaued-Ness of \(p\)-ary (vectorial) functions, 328-345 [Zbl 1420.94122]
Ayebie, Berenger Edoukou; Assidi, Hafsa; Souidi, El Mamoun, A new dynamic code-based group signature scheme, 346-364 [Zbl 1365.94398]
Idrissi, Hind; Ennahbaoui, Mohammed; El Hajji, Said; Souidi, El Mamoun, A secure cloud-based IDPS using cryptographic traces and revocation protocol, 365-382 [Zbl 1485.68091]

MSC:

68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68P25 Data encryption (aspects in computer science)
68P30 Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science)
94A60 Cryptography
94Bxx Theory of error-correcting codes and error-detecting codes
00B25 Proceedings of conferences of miscellaneous specific interest
00B30 Festschriften

Biographic References:

Carlet, Claude

Citations:

Zbl 1316.68010
PDFBibTeX XMLCite
Full Text: DOI