


default search action
3rd C2SI 2019: Rabat, Morocco
- Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi:

Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji. Lecture Notes in Computer Science 11445, Springer 2019, ISBN 978-3-030-16457-7
Side-Channel Analysis
- Youssef Souissi, Adrien Facon, Sylvain Guilley:

Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. 3-12 - Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage

, Youssef Souissi, Yves Mathieu:
Cache-Timing Attacks Still Threaten IoT Devices. 13-30 - Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:

Speed-up of SCA Attacks on 32-bit Multiplications. 31-39
Cryptography
- Abdelmalek Azizi

:
Arabic Cryptography and Steganography in Morocco. 43-54 - Martin Hell, Thomas Johansson

, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida:
An AEAD Variant of the Grain Stream Cipher. 55-71 - Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:

Construction for a Nominative Signature Scheme from Lattice with Enhanced Security. 72-91 - George Teseleanu

:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. 92-104 - Jintai Ding

, Kevin Schmitt, Zheng Zhang:
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem. 105-117 - Vincenzo Iovino

, Ivan Visconti:
Non-interactive Zero Knowledge Proofs in the Random Oracle Model. 118-141 - Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu:

From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions. 142-167
Secret Sharing
- Matthias Geihs, Lucas Schabhüser, Johannes Buchmann:

Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments. 171-194 - Sanyam Mehta, Vishal Saraswat, Smith Sen:

Secret Sharing Using Near-MDS Codes. 195-214
Mathematics for Cryptography
- Sihem Mesnager

, Kübra Kaytanci
, Ferruh Özbudak
:
On Plateaued Functions, Linear Structures and Permutation Polynomials. 217-235 - Hairong Yi, Guiwen Luo, Dongdai Lin:

Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains. 236-253
Codes and Their Applications
- Sihem Mesnager:

On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes. 257-268 - Terry Shue Chien Lau

, Chik How Tan:
A New Gabidulin-Like Code and Its Application in Cryptography. 269-287 - Soukaina Belabssir, Edoukou Berenger Ayebie

, El Mamoun Souidi
:
Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3. 288-306 - Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti:

Quasi-Dyadic Girault Identification Scheme. 307-321
Homomorphic Encryption
- Gérald Gavin, Stéphane Bonnevay

:
Securely Aggregating Testimonies with Threshold Multi-key FHE. 325-348 - Parthasarathi Das, Michael J. Jacobson Jr.

, Renate Scheidler
:
Improved Efficiency of a Linearly Homomorphic Cryptosystem. 349-368
Applied Cryptography
- Grigory Kabatiansky:

On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing. 371-380 - Yongge Wang

, Qutaibah M. Malluhi:
Reusable Garbled Turing Machines Without FHE. 381-398 - Jingchen Yan, Yating Wang, Yuichi Goto

, Jingde Cheng:
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness. 399-408 - Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon:

A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. 409-429
Security
- Said El Hajji, Nabil Moukafih

, Ghizlane Orhanou:
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems. 433-451 - George Teseleanu

:
Managing Your Kleptographic Subscription Plan. 452-461 - Gianpiero Cabodi, Paolo Camurati, Fabrizio F. Finocchiaro, Danilo Vendraminetto

:
Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification. 462-479

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














