


default search action
4th C2SI 2023: Rabat, Morocco
- Said El Hajji

, Sihem Mesnager
, El Mamoun Souidi
:
Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings. Lecture Notes in Computer Science 13874, Springer 2023, ISBN 978-3-031-33016-2
Invited Papers
- Yvo Desmedt:

Cryptologists Should Not Ignore the History of Al-Andalusia. 3-9 - Loïc Bidoux, Philippe Gaborit:

Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems. 10-42 - David Naccache, Ofer Yifrach-Stav:

On Catalan Constant Continued Fractions. 43-54
Cryptography
- Callum McLoughlin, Clémentine Gritti

, Juliet Samandari
:
Full Post-Quantum Datagram TLS Handshake in the Internet of Things. 57-76 - Ousmane Ndiaye

:
Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes. 77-90 - Jannis Leuther

, Stefan Lucks
:
QCB is Blindly Unforgeable. 91-108 - Ruize Wang, Elena Dubrova:

A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. 109-128 - Hussain Ahmad

, Carolin Hannusch
:
A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments. 129-135 - Theo Fanuela Prabowo

, Chik How Tan
:
Attack on a Code-Based Signature Scheme from QC-LDPC Codes. 136-149 - Vikas Kumar

, Bimal Mandal, Aditi Kar Gangopadhyay, Sugata Gangopadhyay:
Computational Results on Gowers U2 and U3 Norms of Known S-Boxes. 150-157 - Grigor Artem, Vincenzo Iovino, Razvan Rosie:

Multi-input Non-interactive Functional Encryption: Constructions and Applications. 158-177 - Mridul Nandi, Sayantan Paul, Abishanka Saha:

Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher. 178-195 - Maya Chartouny, Jacques Patarin, Ambre Toulemonde:

Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes. 196-203 - Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji

:
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification. 204-222
Information Security
- Phung Minh Ngoc

, Mamoru Mimura
:
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments. 225-241 - Evgnosia-Alexandra Kelesidis

, Diana Maimut
, Ilona Teodora Ciocan
:
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas. 242-260 - Binh Le Thanh Thai

, Hidema Tanaka:
A Study for Security of Visual Cryptography. 261-277 - Nadir Sahllal, El Mamoun Souidi:

Forecasting Click Fraud via Machine Learning Algorithms. 278-289 - Hind Idrissi, Mohammed Ennahbaoui:

An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS. 290-320
Discrete Mathematics
- Vladimir Edemskiy

, Sofia Koltsova
:
Symmetric 4-Adic Complexity of Quaternary Generalized Cyclotomic Sequences of Order Four with Period 2pn. 323-337 - Agnese Gini

, Pierrick Méaux
:
Weightwise Perfectly Balanced Functions and Nonlinearity. 338-359 - Stéphane Ballet, Bastien Pacifico:

Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation Maps. 360-375
Coding Theory
- Tomohiro Sekiguchi, Hidema Tanaka:

Security Enhancement Method Using Shortened Error Correcting Codes. 379-394 - Nuh Aydin

, Yiyang Lu, Vishad R. Onta:
An Updated Database of $\mathbb {Z}_4$ Codes and an Open Problem About Quasi-cyclic Codes. 395-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














