default search action
4th C2SI 2023: Rabat, Morocco
- Said El Hajji, Sihem Mesnager, El Mamoun Souidi:
Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings. Lecture Notes in Computer Science 13874, Springer 2023, ISBN 978-3-031-33016-2
Invited Papers
- Yvo Desmedt:
Cryptologists Should Not Ignore the History of Al-Andalusia. 3-9 - Loïc Bidoux, Philippe Gaborit:
Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems. 10-42 - David Naccache, Ofer Yifrach-Stav:
On Catalan Constant Continued Fractions. 43-54
Cryptography
- Callum McLoughlin, Clémentine Gritti, Juliet Samandari:
Full Post-Quantum Datagram TLS Handshake in the Internet of Things. 57-76 - Ousmane Ndiaye:
Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes. 77-90 - Jannis Leuther, Stefan Lucks:
QCB is Blindly Unforgeable. 91-108 - Ruize Wang, Elena Dubrova:
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. 109-128 - Hussain Ahmad, Carolin Hannusch:
A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments. 129-135 - Theo Fanuela Prabowo, Chik How Tan:
Attack on a Code-Based Signature Scheme from QC-LDPC Codes. 136-149 - Vikas Kumar, Bimal Mandal, Aditi Kar Gangopadhyay, Sugata Gangopadhyay:
Computational Results on Gowers U2 and U3 Norms of Known S-Boxes. 150-157 - Grigor Artem, Vincenzo Iovino, Razvan Rosie:
Multi-input Non-interactive Functional Encryption: Constructions and Applications. 158-177 - Mridul Nandi, Sayantan Paul, Abishanka Saha:
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher. 178-195 - Maya Chartouny, Jacques Patarin, Ambre Toulemonde:
Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes. 196-203 - Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji:
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification. 204-222
Information Security
- Phung Minh Ngoc, Mamoru Mimura:
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments. 225-241 - Evgnosia-Alexandra Kelesidis, Diana Maimut, Ilona Teodora Ciocan:
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas. 242-260 - Binh Le Thanh Thai, Hidema Tanaka:
A Study for Security of Visual Cryptography. 261-277 - Nadir Sahllal, El Mamoun Souidi:
Forecasting Click Fraud via Machine Learning Algorithms. 278-289 - Hind Idrissi, Mohammed Ennahbaoui:
An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS. 290-320
Discrete Mathematics
- Vladimir Edemskiy, Sofia Koltsova:
Symmetric 4-Adic Complexity of Quaternary Generalized Cyclotomic Sequences of Order Four with Period 2pn. 323-337 - Agnese Gini, Pierrick Méaux:
Weightwise Perfectly Balanced Functions and Nonlinearity. 338-359 - Stéphane Ballet, Bastien Pacifico:
Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation Maps. 360-375
Coding Theory
- Tomohiro Sekiguchi, Hidema Tanaka:
Security Enhancement Method Using Shortened Error Correcting Codes. 379-394 - Nuh Aydin, Yiyang Lu, Vishad R. Onta:
An Updated Database of $\mathbb {Z}_4$ Codes and an Open Problem About Quasi-cyclic Codes. 395-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.