Skip to main content
  • Conference proceedings
  • © 2019

Codes, Cryptology and Information Security

Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11445)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): C2SI: International Conference on Codes, Cryptology, and Information Security

Conference proceedings info: C2SI 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

    Pages i-xix
  2. Side-Channel Analysis

    1. Front Matter

      Pages 1-1
    2. Virtual Security Evaluation

      • Youssef Souissi, Adrien Facon, Sylvain Guilley
      Pages 3-12
    3. Cache-Timing Attacks Still Threaten IoT Devices

      • Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi et al.
      Pages 13-30
    4. Speed-up of SCA Attacks on 32-bit Multiplications

      • Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
      Pages 31-39
  3. Cryptography

    1. Front Matter

      Pages 41-41
    2. An AEAD Variant of the Grain Stream Cipher

      • Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida
      Pages 55-71
    3. Construction for a Nominative Signature Scheme from Lattice with Enhanced Security

      • Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
      Pages 72-91
    4. Non-interactive Zero Knowledge Proofs in the Random Oracle Model

      • Vincenzo Iovino, Ivan Visconti
      Pages 118-141
    5. From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions

      • Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu
      Pages 142-167
  4. Secret Sharing

    1. Front Matter

      Pages 169-169
    2. Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments

      • Matthias Geihs, Lucas Schabhüser, Johannes Buchmann
      Pages 171-194
    3. Secret Sharing Using Near-MDS Codes

      • Sanyam Mehta, Vishal Saraswat, Smith Sen
      Pages 195-214
  5. Mathematics for Cryptography

    1. Front Matter

      Pages 215-215
    2. On Plateaued Functions, Linear Structures and Permutation Polynomials

      • Sihem Mesnager, Kübra Kaytancı, Ferruh Özbudak
      Pages 217-235
  6. Codes and Their Applications

    1. Front Matter

      Pages 255-255

Other Volumes

  1. Codes, Cryptology and Information Security

About this book

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.

Editors and Affiliations

  • Université Paris 8, Saint-Denis, France

    Claude Carlet

  • Institut MINES-TELECOM, Paris, France

    Sylvain Guilley

  • Université de Caen, Caen, France

    Abderrahmane Nitaj

  • Mohammed V University, Rabat, Morocco

    El Mamoun Souidi

Bibliographic Information

  • Book Title: Codes, Cryptology and Information Security

  • Book Subtitle: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji

  • Editors: Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-030-16458-4

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer Nature Switzerland AG 2019

  • Softcover ISBN: 978-3-030-16457-7Published: 29 March 2019

  • eBook ISBN: 978-3-030-16458-4Published: 15 April 2019

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIX, 482

  • Number of Illustrations: 221 b/w illustrations, 23 illustrations in colour

  • Topics: Systems and Data Security, Cryptology, Software Engineering, Coding and Information Theory

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access