default search action
3rd C2SI 2019: Rabat, Morocco
- Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji. Lecture Notes in Computer Science 11445, Springer 2019, ISBN 978-3-030-16457-7
Side-Channel Analysis
- Youssef Souissi, Adrien Facon, Sylvain Guilley:
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. 3-12 - Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu:
Cache-Timing Attacks Still Threaten IoT Devices. 13-30 - Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad:
Speed-up of SCA Attacks on 32-bit Multiplications. 31-39
Cryptography
- Abdelmalek Azizi:
Arabic Cryptography and Steganography in Morocco. 43-54 - Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida:
An AEAD Variant of the Grain Stream Cipher. 55-71 - Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay:
Construction for a Nominative Signature Scheme from Lattice with Enhanced Security. 72-91 - George Teseleanu:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. 92-104 - Jintai Ding, Kevin Schmitt, Zheng Zhang:
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem. 105-117 - Vincenzo Iovino, Ivan Visconti:
Non-interactive Zero Knowledge Proofs in the Random Oracle Model. 118-141 - Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu:
From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions. 142-167
Secret Sharing
- Matthias Geihs, Lucas Schabhüser, Johannes Buchmann:
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments. 171-194 - Sanyam Mehta, Vishal Saraswat, Smith Sen:
Secret Sharing Using Near-MDS Codes. 195-214
Mathematics for Cryptography
- Sihem Mesnager, Kübra Kaytanci, Ferruh Özbudak:
On Plateaued Functions, Linear Structures and Permutation Polynomials. 217-235 - Hairong Yi, Guiwen Luo, Dongdai Lin:
Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains. 236-253
Codes and Their Applications
- Sihem Mesnager:
On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes. 257-268 - Terry Shue Chien Lau, Chik How Tan:
A New Gabidulin-Like Code and Its Application in Cryptography. 269-287 - Soukaina Belabssir, Edoukou Berenger Ayebie, El Mamoun Souidi:
Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3. 288-306 - Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti:
Quasi-Dyadic Girault Identification Scheme. 307-321
Homomorphic Encryption
- Gérald Gavin, Stéphane Bonnevay:
Securely Aggregating Testimonies with Threshold Multi-key FHE. 325-348 - Parthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler:
Improved Efficiency of a Linearly Homomorphic Cryptosystem. 349-368
Applied Cryptography
- Grigory Kabatiansky:
On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing. 371-380 - Yongge Wang, Qutaibah M. Malluhi:
Reusable Garbled Turing Machines Without FHE. 381-398 - Jingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng:
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness. 399-408 - Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon:
A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. 409-429
Security
- Said El Hajji, Nabil Moukafih, Ghizlane Orhanou:
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems. 433-451 - George Teseleanu:
Managing Your Kleptographic Subscription Plan. 452-461 - Gianpiero Cabodi, Paolo Camurati, Fabrizio F. Finocchiaro, Danilo Vendraminetto:
Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification. 462-479
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.