First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger Herausgegeben:El Hajji, Said; Nitaj, Abderrahmane; Carlet, Claude; Souidi, El Mamoun
First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger Herausgegeben:El Hajji, Said; Nitaj, Abderrahmane; Carlet, Claude; Souidi, El Mamoun
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and…mehr
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.
The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.
Multidimensional Bell Inequalities and Quantum Cryptography.- Securing the Web of Things with Role-Based Access Control.- On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax.- Differential Attacks Against SPN: A Thorough Analysis.- On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions.- Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards.- Extended Abstract: Codes as Modules over Skew Polynomial Rings.- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask.- A Dynamic Attribute-Based Authentication Scheme.- Repeated-Root Isodual Cyclic Codes over Finite Fields.- Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.- Countermeasures Mitigation for Designing Rich Shell Code in Java Card.- Weaknesses in Two RFID Authentication Protocols.- Square Code Attack on a Modified Sidelnikov Cryptosystem.- A Family of Six-Weight Reducible Cyclic Codes and their Weight Distribution.- Codes over L ( GF (2) m,GF (2) m ), MDS Diffusion Matrices and Cryptographic Applications.- A Higher Order Key Partitioning Attack with Application to LBlock.- A Note on the Existence of Self-Dual Skew Codes over Finite Fields.- he Weight Distribution of a Family of Lagrangian-Grassmannian Codes.- Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and Its Application.- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography.- Impossible Differential Properties of Reduced Round Streebog.- Security Issues on Inter-Domain Routing with QoS-CMS Mechanism.- Uncovering Self Code Modification in Android.- Performance of LDPC Decoding Algorithms with a Statistical Physics Theory Approach.- Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP).- Watermarking Based Multi-biometric Fusion Approach.- New Attacks on RSA with Moduli N = prq.- Factoring RSA Moduli with Weak Prime Factors.
Multidimensional Bell Inequalities and Quantum Cryptography.- Securing the Web of Things with Role-Based Access Control.- On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax.- Differential Attacks Against SPN: A Thorough Analysis.- On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions.- Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards.- Extended Abstract: Codes as Modules over Skew Polynomial Rings.- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask.- A Dynamic Attribute-Based Authentication Scheme.- Repeated-Root Isodual Cyclic Codes over Finite Fields.- Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.- Countermeasures Mitigation for Designing Rich Shell Code in Java Card.- Weaknesses in Two RFID Authentication Protocols.- Square Code Attack on a Modified Sidelnikov Cryptosystem.- A Family of Six-Weight Reducible Cyclic Codes and their Weight Distribution.- Codes over L ( GF (2) m,GF (2) m ), MDS Diffusion Matrices and Cryptographic Applications.- A Higher Order Key Partitioning Attack with Application to LBlock.- A Note on the Existence of Self-Dual Skew Codes over Finite Fields.- he Weight Distribution of a Family of Lagrangian-Grassmannian Codes.- Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and Its Application.- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography.- Impossible Differential Properties of Reduced Round Streebog.- Security Issues on Inter-Domain Routing with QoS-CMS Mechanism.- Uncovering Self Code Modification in Android.- Performance of LDPC Decoding Algorithms with a Statistical Physics Theory Approach.- Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP).- Watermarking Based Multi-biometric Fusion Approach.- New Attacks on RSA with Moduli N = prq.- Factoring RSA Moduli with Weak Prime Factors.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497