Skip to main content
  • Conference proceedings
  • © 2017

Codes, Cryptology and Information Security

Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10194)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): C2SI: International Conference on Codes, Cryptology, and Information Security

Conference proceedings info: C2SI 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

    Pages I-XII
  2. Invited Papers

    1. Front Matter

      Pages 1-1
    2. Some Results on the Known Classes of Quadratic APN Functions

      • Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
      Pages 3-16
    3. Codes for Side-Channel Attacks and Protections

      • Sylvain Guilley, Annelie Heuser, Olivier Rioul
      Pages 35-55
    4. An Overview of the State-of-the-Art of Cloud Computing Cyber-Security

      • H. Bennasar, A. Bendahmane, M. Essaaidi
      Pages 56-67
    5. Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges

      • Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore et al.
      Pages 68-82
  3. Regular Papers

    1. Front Matter

      Pages 83-83
    2. Parameters of 2-Designs from Some BCH Codes

      • Cunsheng Ding, Zhengchun Zhou
      Pages 110-127
    3. A Median Nearest Neighbors LDA for Anomaly Network Detection

      • Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou
      Pages 128-141
    4. Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability

      • Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann
      Pages 142-160
    5. Constacyclic Codes over Finite Principal Ideal Rings

      • Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin
      Pages 161-175
    6. On Isodual Cyclic Codes over Finite Chain Rings

      • Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin
      Pages 176-194
    7. Revisiting the Efficient Key Generation of ZHFE

      • Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
      Pages 195-212
    8. The Weight Distribution for an Extended Family of Reducible Cyclic Codes

      • Gerardo Vega, Jesús E. Cuén-Ramos
      Pages 213-229
    9. A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography

      • Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti
      Pages 230-237
    10. Spectral Approach for Correlation Power Analysis

      • Philippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet
      Pages 238-253
    11. Efficient Implementation of Hybrid Encryption from Coding Theory

      • Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti
      Pages 254-264

Other Volumes

  1. Codes, Cryptology and Information Security

About this book

This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

Editors and Affiliations

  • University of Mohammed V, Rabat, Morocco

    Said El Hajji, El Mamoun Souidi

  • University of Caen, Caen, France

    Abderrahmane Nitaj

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access