


default search action
C2SI 2017: Rabat, Morocco
- Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi:

Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet. Lecture Notes in Computer Science 10194, Springer 2017, ISBN 978-3-319-55588-1
Invited Papers
- Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:

Some Results on the Known Classes of Quadratic APN Functions. 3-16 - María Isabel García-Planas:

Families of Convolutional Codes over Finite Fields: A Survey. 17-34 - Sylvain Guilley, Annelie Heuser, Olivier Rioul

:
Codes for Side-Channel Attacks and Protections. 35-55 - Hanane Bennasar

, Ahmed Bendahmane
, Mohammed Essaaidi
:
An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. 56-67 - Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat

, Vincent Herbert, Vianney Lapôtre
, Vincent Migliore, Adeline Roux-Langlois
:
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges. 68-82
Regular Papers
- Abdoul Aziz Ciss, Djiby Sow:

Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key Exchange. 85-95 - Cheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose:

Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q. 96-109 - Cunsheng Ding, Zhengchun Zhou

:
Parameters of 2-Designs from Some BCH Codes. 110-127 - Zyad Elkhadir

, Khalid Chougdali
, Mohammed Benattou
:
A Median Nearest Neighbors LDA for Anomaly Network Detection. 128-141 - Patrick Struck

, Lucas Schabhüser, Denise Demirel, Johannes Buchmann:
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. 142-160 - Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin:

Constacyclic Codes over Finite Principal Ideal Rings. 161-175 - Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin:

On Isodual Cyclic Codes over Finite Chain Rings. 176-194 - Yasuhiko Ikematsu, Dung Hoang Duong

, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. 195-212 - Gerardo Vega, Jesús E. Cuén-Ramos:

The Weight Distribution for an Extended Family of Reducible Cyclic Codes. 213-229 - Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti:

A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography. 230-237 - Philippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet:

Spectral Approach for Correlation Power Analysis. 238-253 - Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye

, Edoardo Persichetti
:
Efficient Implementation of Hybrid Encryption from Coding Theory. 254-264 - Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong:

On the Multi-output Filtering Model and Its Applications. 265-281 - Sihem Mesnager, Pinar Ongan, Ferruh Özbudak

:
New Bent Functions from Permutations and Linear Translators. 282-297 - Fengrong Zhang, Enes Pasalic

, Nastja Cepak
, Yongzhuang Wei:
Bent Functions in C and D Outside the Completed Maiorana-McFarland Class. 298-313 - Sugata Gangopadhyay, Subhamoy Maitra, Nishant Sinha, Pantelimon Stanica

:
Quantum Algorithms Related to \textitHN -Transforms of Boolean Functions. 314-327 - Claude Carlet, Sihem Mesnager, Ferruh Özbudak

, Ahmet Sinak
:
Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions. 328-345 - Berenger Edoukou Ayebie

, Hafsa Assidi, El Mamoun Souidi
:
A New Dynamic Code-Based Group Signature Scheme. 346-364 - Hind Idrissi

, Mohammed Ennahbaoui, Said El Hajji, El Mamoun Souidi
:
A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol. 365-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














