Muutke küpsiste eelistusi

E-raamat: Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji

Edited by , Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.





The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.
Side-Channel Analysis
Virtual Security Evaluation: An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level
3(10)
Youssef Souissi
Adrien Facon
Sylvain Guilley
Cache-Timing Attacks Still Threaten IoT Devices
13(18)
Sofiane Takarabt
Alexander Schaub
Adrien Facon
Sylvain Guilley
Laurent Sauvage
Youssef Souissi
Yves Mathieu
Speed-up of SCA Attacks on 32-bit Multiplications
31(12)
Robert Nguyen
Adrien Facon
Sylvain Guilley
Guillaume Gautier
Safwan El Assad
Cryptography
Arabic Cryptography and Steganography in Morocco
43(12)
Abdelmalek Azizi
An AEAD Variant of the Grain Stream Cipher
55(17)
Martin Hell
Thomas Johansson
Willi Meier
Jonathan Sonnerup
Hirotaka Yoshida
Construction for a Nominative Signature Scheme from Lattice with Enhanced Security
72(20)
Meenakshi Kansal
Ratna Dutta
Sourav Mukhopadhyay
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG
92(13)
George Teseleanu
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem
105(13)
Jintai Ding
Kevin Schmitt
Zheng Zhang
Non-interactive Zero Knowledge Proofs in the Random Oracle Model
118(24)
Vincenzo lovino
Ivan Visconti
From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions
142(29)
Linru Zhang
Yuechen Chen
Jun Zhang
Meiqi He
Siu-Ming Yiu
Secret Sharing
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments
171(24)
Matthias Geihs
Lucas Schabhiiser
Johannes Buchmann
Secret Sharing Using Near-MDS Codes
195(22)
Sanyam Mehta
Vishal Saraswat
Smith Sen
Mathematics for Cryptography
On Plateaued Functions, Linear Structures and Permutation Polynomials
217(19)
Sihem Mesnager
Kiibra Kaytanci
Ferruh Ozbudak
Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains
236(21)
Hairong Yi
Guiwen Luo
Dongdai Lin
Codes and Their Applications
On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes
257(12)
Sihem Mesnager
A New Gabidulin-Like Code and Its Application in Cryptography
269(19)
Terry Shue Chien Lau
Chik How Tan
Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum π-distance 3
288(19)
Soukaina Belabssir
Edoukou Berenger Ayebie
El Mamoun Souidi
Quasi-Dyadic Girault Identification Scheme
307(18)
Brice Odilon Boidje
Cheikh Thiecoumba Gueye
Gilbert Ndollane Dione
Jean Belo Klamti
Homomorphic Encryption
Securely Aggregating Testimonies with Threshold Multi-key FHE
325(24)
Gerald Gavin
Stephane Bonnevay
Improved Efficiency of a Linearly Homomorphic Cryptosystem
349(22)
Parthasarathi Das
Michael J. Jacobson Jr.
Renate Scheidler
Applied Cryptography
On the Tracing Traitors Math: Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing
371(10)
Grigory Kabatiansky
Reusable Garbled Turing Machines Without FHE
381(18)
Yongge Wang
Qutaibah M. Malluhi
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness
399(10)
Jingchen Yan
Yating Wang
Yuichi Goto
Jingde Cheng
A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation
409(24)
Augustin P. Sarr
Papa B. Seye
Togde Ngarenon
Security
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems
433(19)
Said El Hujji
Nabil Moukafih
Ghizlane Orhanou
Managing Your Kleptographic Subscription Plan
452(10)
George Teseleanu
Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification
462(19)
Gianpiero Cabodi
Paolo Camurati
Fabrizio Finocchiaro
Danilo Vendraminetto
Author Index 481