default search action
C2SI 2017: Rabat, Morocco
- Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet. Lecture Notes in Computer Science 10194, Springer 2017, ISBN 978-3-319-55588-1
Invited Papers
- Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:
Some Results on the Known Classes of Quadratic APN Functions. 3-16 - María Isabel García-Planas:
Families of Convolutional Codes over Finite Fields: A Survey. 17-34 - Sylvain Guilley, Annelie Heuser, Olivier Rioul:
Codes for Side-Channel Attacks and Protections. 35-55 - Hanane Bennasar, Ahmed Bendahmane, Mohammed Essaaidi:
An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. 56-67 - Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore, Adeline Roux-Langlois:
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges. 68-82
Regular Papers
- Abdoul Aziz Ciss, Djiby Sow:
Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key Exchange. 85-95 - Cheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose:
Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q. 96-109 - Cunsheng Ding, Zhengchun Zhou:
Parameters of 2-Designs from Some BCH Codes. 110-127 - Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou:
A Median Nearest Neighbors LDA for Anomaly Network Detection. 128-141 - Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann:
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. 142-160 - Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin:
Constacyclic Codes over Finite Principal Ideal Rings. 161-175 - Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin:
On Isodual Cyclic Codes over Finite Chain Rings. 176-194 - Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. 195-212 - Gerardo Vega, Jesús E. Cuén-Ramos:
The Weight Distribution for an Extended Family of Reducible Cyclic Codes. 213-229 - Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti:
A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography. 230-237 - Philippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet:
Spectral Approach for Correlation Power Analysis. 238-253 - Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti:
Efficient Implementation of Hybrid Encryption from Coding Theory. 254-264 - Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong:
On the Multi-output Filtering Model and Its Applications. 265-281 - Sihem Mesnager, Pinar Ongan, Ferruh Özbudak:
New Bent Functions from Permutations and Linear Translators. 282-297 - Fengrong Zhang, Enes Pasalic, Nastja Cepak, Yongzhuang Wei:
Bent Functions in C and D Outside the Completed Maiorana-McFarland Class. 298-313 - Sugata Gangopadhyay, Subhamoy Maitra, Nishant Sinha, Pantelimon Stanica:
Quantum Algorithms Related to \textitHN -Transforms of Boolean Functions. 314-327 - Claude Carlet, Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak:
Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions. 328-345 - Berenger Edoukou Ayebie, Hafsa Assidi, El Mamoun Souidi:
A New Dynamic Code-Based Group Signature Scheme. 346-364 - Hind Idrissi, Mohammed Ennahbaoui, Said El Hajji, El Mamoun Souidi:
A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol. 365-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.