default search action
C2SI 2015: Rabat, Morocco
- Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi:
Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger. Lecture Notes in Computer Science 9084, Springer 2015, ISBN 978-3-319-18680-1
Invited Papers
- François Arnault:
Multidimensional Bell Inequalities and Quantum Cryptography. 3-13 - Ezedin Barka, Sujith Samuel Mathew, Yacine Atif:
Securing the Web of Things with Role-Based Access Control. 14-26 - Matthias Geihs, Denise Demirel, Johannes Buchmann:
On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax. 27-44 - Anne Canteaut, Joëlle Roué:
Differential Attacks Against SPN: A Thorough Analysis. 45-62 - Claude Carlet:
On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions. 63-73 - Jean-Louis Lanet:
Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards. 74-82 - Felix Ulmer:
Extended Abstract: Codes as Modules over Skew Polynomial Rings. 83-86
Regular Papers
- Thierry P. Berger, Julien Francq, Marine Minier:
CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask. 89-105 - Huihui Yang, Vladimir A. Oleshchuk:
A Dynamic Attribute-Based Authentication Scheme. 106-118 - Aicha Batoul, Kenza Guenda, T. Aaron Gulliver:
Repeated-Root Isodual Cyclic Codes over Finite Fields. 119-132 - Marwa Ziadia, Mohamed Mejri:
Formal Enforcement of Security Policies on Parallel Systems with Risk Integration. 133-148 - Noreddine El Janati El Idrissi, Said El Hajji, Jean-Louis Lanet:
Countermeasures Mitigation for Designing Rich Shell Code in Java Card. 149-161 - Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed:
Weaknesses in Two RFID Authentication Protocols. 162-172 - Ayoub Otmani, Hervé Talé Kalachi:
Square Code Attack on a Modified Sidelnikov Cryptosystem. 173-183 - Gerardo Vega:
A Family of Six-Weight Reducible Cyclic Codes and their Weight Distribution. 184-196 - Thierry P. Berger, Nora El Amrani:
Codes over L(GF(2)m, GF(2)m) , MDS Diffusion Matrices and Cryptographic Applications. 197-214 - Riham AlTawy, Mohamed Tolba, Amr M. Youssef:
A Higher Order Key Partitioning Attack with Application to LBlock. 215-227 - Delphine Boucher:
A Note on the Existence of Self-Dual Skew Codes over Finite Fields. 228-239 - Jesús Carrillo-Pacheco, Gerardo Vega, Felipe Zaldívar:
The Weight Distribution of a Family of Lagrangian-Grassmannian Codes. 240-246 - Alla Levina, Sergey V. Taranov:
Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and its Application. 247-258 - Nadia El Mrabet, Emmanuel Fouotsa:
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography. 259-273 - Ahmed Abdelkhalek, Riham AlTawy, Amr M. Youssef:
Impossible Differential Properties of Reduced Round Streebog. 274-286 - Hafssa Benaboud, Sara Bakkali, José Johnny Randriamampionona:
Security Issues on Inter-Domain Routing with QoS-CMS Mechanism. 287-296 - Faisal Nasim, Baber Aslam, Waseem Ahmed, Talha Naeem:
Uncovering Self Code Modification in Android. 297-313 - Manel Abdelhedi, Omessaad Hamdi, Ammar Bouallegue:
Performance of LDPC Decoding Algorithms with a Statistical Physics Theory Approach. 314-330 - Maleika Heenaye-Mamode Khan:
Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP). 331-341 - Sanaa Ghouzali:
Watermarking Based Multi-biometric Fusion Approach. 342-351 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
New Attacks on RSA with Moduli N = p r q. 352-360 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Factoring RSA Moduli with Weak Prime Factors. 361-374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.