My Account Log in

1 option

Codes, Cryptology and Information Security : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / edited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Author/Creator:
El Hajji, Said.
Contributor:
Mesnager, Sihem.
Souidi, El Mamoun.
Series:
Lecture Notes in Computer Science, 1611-3349 ; 13874
Language:
English
Subjects (All):
Data protection.
Data and Information Security.
Local Subjects:
Data and Information Security.
Physical Description:
1 online resource (415 pages)
Edition:
1st ed. 2023.
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2023.
Summary:
This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.
Contents:
Invited Papers
Cryptologists should not ignore the history of Al-Andalusia
Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems
On Catalan Constant Continued Fractions
Cryptography
Full Post-Quantum Datagram TLS Handshake in the Internet of Things
Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes
QCB is Blindly Unforgeable
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts
A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments
Attack on a Code-based Signature Scheme from QC-LDPC Codes
Computational results on Gowers U2 and U3 norms of known S-Boxes
Multi-Input Non-Interactive Functional Encryption: Constructions and Applications
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher
Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes
Lattice-based accumulator with constant time list update and constant time verification
Information Security
Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas
A Study for Security of Visual Cryptography
Forecasting Click Fraud via Machine Learning Algorithms
An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS
Discrete Mathematics
Symmetric 4-adic complexity of quaternary sequences with period 2p n
Weightwise perfectly balanced functions and nonlinearity
Chudnovsky-type algorithms over the projective line using generalized evaluation maps
Coding Theory
Security enhancement method using shortened error correcting codes
An UpdatedDatabase of Z4 Codes and an Open Problem about Quasi-Cyclic Codes.
Other Format:
Print version: El Hajji, Said Codes, Cryptology and Information Security
ISBN:
9783031330179
OCLC:
1379803754

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account