Login / Signup
C2SI
2015
2018
2023
2015
2023
Keyphrases
Publications
2023
Nuh Aydin
,
Yiyang Lu
,
Vishad R. Onta
An Updated Database of $\mathbb {Z}_4$ Codes and an Open Problem About Quasi-cyclic Codes.
C2SI
(2023)
Evgnosia-Alexandra Kelesidis
,
Diana Maimut
,
Ilona Teodora Ciocan
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas.
C2SI
(2023)
Tomohiro Sekiguchi
,
Hidema Tanaka
Security Enhancement Method Using Shortened Error Correcting Codes.
C2SI
(2023)
Loïc Bidoux
,
Philippe Gaborit
Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems.
C2SI
(2023)
Ousmane Ndiaye
Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes.
C2SI
(2023)
Agnese Gini
,
Pierrick Méaux
Weightwise Perfectly Balanced Functions and Nonlinearity.
C2SI
(2023)
Hind Idrissi
,
Mohammed Ennahbaoui
An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS.
C2SI
(2023)
Yvo Desmedt
Cryptologists Should Not Ignore the History of Al-Andalusia.
C2SI
(2023)
Hussain Ahmad
,
Carolin Hannusch
A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments.
C2SI
(2023)
Maya Chartouny
,
Jacques Patarin
,
Ambre Toulemonde
Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes.
C2SI
(2023)
Mridul Nandi
,
Sayantan Paul
,
Abishanka Saha
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher.
C2SI
(2023)
Callum McLoughlin
,
Clémentine Gritti
,
Juliet Samandari
Full Post-Quantum Datagram TLS Handshake in the Internet of Things.
C2SI
(2023)
Yuta Maeno
,
Hideaki Miyaji
,
Atsuko Miyaji
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification.
C2SI
(2023)
Stéphane Ballet
,
Bastien Pacifico
Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation Maps.
C2SI
(2023)
Ruize Wang
,
Elena Dubrova
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts.
C2SI
(2023)
Jannis Leuther
,
Stefan Lucks
QCB is Blindly Unforgeable.
C2SI
(2023)
Phung Minh Ngoc
,
Mamoru Mimura
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments.
C2SI
(2023)
David Naccache
,
Ofer Yifrach-Stav
On Catalan Constant Continued Fractions.
C2SI
(2023)
Theo Fanuela Prabowo
,
Chik How Tan
Attack on a Code-Based Signature Scheme from QC-LDPC Codes.
C2SI
(2023)
Vladimir Edemskiy
,
Sofia Koltsova
.
C2SI
(2023)
Binh Le Thanh Thai
,
Hidema Tanaka
A Study for Security of Visual Cryptography.
C2SI
(2023)
Grigor Artem
,
Vincenzo Iovino
,
Razvan Rosie
Multi-input Non-interactive Functional Encryption: Constructions and Applications.
C2SI
(2023)
Nadir Sahllal
,
El Mamoun Souidi
Forecasting Click Fraud via Machine Learning Algorithms.
C2SI
(2023)
Vikas Kumar
,
Bimal Mandal
,
Aditi Kar Gangopadhyay
,
Sugata Gangopadhyay
Norms of Known S-Boxes.
C2SI
(2023)
volume 13874, 2023
Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings
C2SI
13874 (2023)
2019
Sihem Mesnager
On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes.
C2SI
(2019)
Augustin P. Sarr
,
Papa B. Seye
,
Togdé Ngarenon
A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation.
C2SI
(2019)
Jintai Ding
,
Kevin Schmitt
,
Zheng Zhang
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem.
C2SI
(2019)
George Teseleanu
Managing Your Kleptographic Subscription Plan.
C2SI
(2019)
Yongge Wang
,
Qutaibah M. Malluhi
Reusable Garbled Turing Machines Without FHE.
C2SI
(2019)
Hairong Yi
,
Guiwen Luo
,
Dongdai Lin
Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains.
C2SI
(2019)
Meenakshi Kansal
,
Ratna Dutta
,
Sourav Mukhopadhyay
Construction for a Nominative Signature Scheme from Lattice with Enhanced Security.
C2SI
(2019)
Martin Hell
,
Thomas Johansson
,
Willi Meier
,
Jonathan Sönnerup
,
Hirotaka Yoshida
An AEAD Variant of the Grain Stream Cipher.
C2SI
(2019)
Matthias Geihs
,
Lucas Schabhüser
,
Johannes Buchmann
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.
C2SI
(2019)
Said El Hajji
,
Nabil Moukafih
,
Ghizlane Orhanou
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems.
C2SI
(2019)
Sanyam Mehta
,
Vishal Saraswat
,
Smith Sen
Secret Sharing Using Near-MDS Codes.
C2SI
(2019)
Terry Shue Chien Lau
,
Chik How Tan
A New Gabidulin-Like Code and Its Application in Cryptography.
C2SI
(2019)
Gérald Gavin
,
Stéphane Bonnevay
Securely Aggregating Testimonies with Threshold Multi-key FHE.
C2SI
(2019)
Grigory Kabatiansky
On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing.
C2SI
(2019)
Jingchen Yan
,
Yating Wang
,
Yuichi Goto
,
Jingde Cheng
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness.
C2SI
(2019)
Abdelmalek Azizi
Arabic Cryptography and Steganography in Morocco.
C2SI
(2019)
Vincenzo Iovino
,
Ivan Visconti
Non-interactive Zero Knowledge Proofs in the Random Oracle Model.
C2SI
(2019)
Youssef Souissi
,
Adrien Facon
,
Sylvain Guilley
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level.
C2SI
(2019)
George Teseleanu
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG.
C2SI
(2019)
Brice Odilon Boidje
,
Cheikh Thiecoumba Gueye
,
Gilbert Ndollane Dione
,
Jean Belo Klamti
Quasi-Dyadic Girault Identification Scheme.
C2SI
(2019)
Sofiane Takarabt
,
Alexander Schaub
,
Adrien Facon
,
Sylvain Guilley
,
Laurent Sauvage
,
Youssef Souissi
,
Yves Mathieu
Cache-Timing Attacks Still Threaten IoT Devices.
C2SI
(2019)
Soukaina Belabssir
,
Edoukou Berenger Ayebie
,
El Mamoun Souidi
Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3.
C2SI
(2019)
Gianpiero Cabodi
,
Paolo Camurati
,
Fabrizio F. Finocchiaro
,
Danilo Vendraminetto
Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification.
C2SI
(2019)
Parthasarathi Das
,
Michael J. Jacobson Jr.
,
Renate Scheidler
Improved Efficiency of a Linearly Homomorphic Cryptosystem.
C2SI
(2019)
volume 11445, 2019
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji
C2SI
11445 (2019)