Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Hussain Ahmad, Carolin Hannusch |
A New Keyed Hash Function Based on Latin Squares and Error-Correcting Codes to Authenticate Users in Smart Home Environments. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Theo Fanuela Prabowo, Chik How Tan |
Attack on a Code-Based Signature Scheme from QC-LDPC Codes. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Maya Chartouny, Jacques Patarin, Ambre Toulemonde |
Quantum Cryptanalysis of 5 Rounds Feistel Schemes and Benes Schemes. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Nandi, Sayantan Paul, Abishanka Saha |
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Binh Le Thanh Thai, Hidema Tanaka |
A Study for Security of Visual Cryptography. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vikas Kumar, Bimal Mandal, Aditi Kar Gangopadhyay, Sugata Gangopadhyay |
Computational Results on Gowers U2 and U3 Norms of Known S-Boxes. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Grigor Artem, Vincenzo Iovino, Razvan Rosie |
Multi-input Non-interactive Functional Encryption: Constructions and Applications. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Tomohiro Sekiguchi, Hidema Tanaka |
Security Enhancement Method Using Shortened Error Correcting Codes. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Nuh Aydin, Yiyang Lu, Vishad R. Onta |
An Updated Database of $\mathbb {Z}_4$ Codes and an Open Problem About Quasi-cyclic Codes. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Agnese Gini, Pierrick Méaux |
Weightwise Perfectly Balanced Functions and Nonlinearity. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Said El Hajji 0001, Sihem Mesnager, El Mamoun Souidi (eds.) |
Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt |
Cryptologists Should Not Ignore the History of Al-Andalusia. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Evgnosia-Alexandra Kelesidis, Diana Maimut, Ilona Teodora Ciocan |
Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Loïc Bidoux, Philippe Gaborit |
Compact Post-quantum Signatures from Proofs of Knowledge Leveraging Structure for the sfPKP, sfSD and sfRSD Problems. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji |
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ousmane Ndiaye |
Moderate Classical McEliece Keys from Quasi-Centrosymmetric Goppa Codes. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Hind Idrissi, Mohammed Ennahbaoui |
An Enhanced Anonymous ECC-Based Authentication for Lightweight Application in TMIS. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Jannis Leuther, Stefan Lucks |
QCB is Blindly Unforgeable. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Ruize Wang, Elena Dubrova |
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Edemskiy, Sofia Koltsova |
Symmetric 4-Adic Complexity of Quaternary Generalized Cyclotomic Sequences of Order Four with Period 2pn. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Callum McLoughlin, Clémentine Gritti, Juliet Samandari |
Full Post-Quantum Datagram TLS Handshake in the Internet of Things. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Nadir Sahllal, El Mamoun Souidi |
Forecasting Click Fraud via Machine Learning Algorithms. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Phung Minh Ngoc, Mamoru Mimura |
Malicious JavaScript Detection Based on AST Analysis and Key Feature Re-sampling in Realistic Environments. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | David Naccache, Ofer Yifrach-Stav |
On Catalan Constant Continued Fractions. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Stéphane Ballet, Bastien Pacifico |
Chudnovsky-Type Algorithms over the Projective Line Using Generalized Evaluation Maps. |
C2SI |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Parthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler |
Improved Efficiency of a Linearly Homomorphic Cryptosystem. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Hairong Yi, Guiwen Luo, Dongdai Lin |
Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Abdelmalek Azizi |
Arabic Cryptography and Steganography in Morocco. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad |
Speed-up of SCA Attacks on 32-bit Multiplications. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jingchen Yan, Yating Wang, Yuichi Goto, Jingde Cheng |
An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Youssef Souissi, Adrien Facon, Sylvain Guilley |
Virtual Security Evaluation - An Operational Methodology for Side-Channel Leakage Detection at Source-Code Level. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi (eds.) |
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sofiane Takarabt, Alexander Schaub 0001, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi, Yves Mathieu |
Cache-Timing Attacks Still Threaten IoT Devices. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | George Teseleanu |
Managing Your Kleptographic Subscription Plan. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Geihs, Lucas Schabhüser, Johannes Buchmann 0001 |
Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Terry Shue Chien Lau, Chik How Tan |
A New Gabidulin-Like Code and Its Application in Cryptography. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Vincenzo Iovino, Ivan Visconti |
Non-interactive Zero Knowledge Proofs in the Random Oracle Model. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gianpiero Cabodi, Paolo Camurati, Fabrizio F. Finocchiaro, Danilo Vendraminetto |
Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Kevin Schmitt, Zheng Zhang |
A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay |
Construction for a Nominative Signature Scheme from Lattice with Enhanced Security. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Said El Hajji 0001, Nabil Moukafih, Ghizlane Orhanou |
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sanyam Mehta, Vishal Saraswat, Smith Sen |
Secret Sharing Using Near-MDS Codes. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Grigory Kabatiansky |
On the Tracing Traitors Math - Dedicated to the Memory of Bob Blakley - Pioneer of Digital Fingerprinting and Inventor of Secret Sharing. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti |
Quasi-Dyadic Girault Identification Scheme. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gérald Gavin, Stéphane Bonnevay |
Securely Aggregating Testimonies with Threshold Multi-key FHE. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yongge Wang, Qutaibah M. Malluhi |
Reusable Garbled Turing Machines Without FHE. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sihem Mesnager |
On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon |
A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Martin Hell, Thomas Johansson 0001, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida |
An AEAD Variant of the Grain Stream Cipher. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Linru Zhang, Yuechen Chen, Jun Zhang 0049, Meiqi He, Siu-Ming Yiu |
From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Soukaina Belabssir, Edoukou Berenger Ayebie, El Mamoun Souidi |
Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum \pi -distance 3. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Sihem Mesnager, Kübra Kaytanci, Ferruh Özbudak |
On Plateaued Functions, Linear Structures and Permutation Polynomials. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | George Teseleanu |
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. |
C2SI |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin |
Constacyclic Codes over Finite Principal Ideal Rings. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Teng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong |
On the Multi-output Filtering Model and Its Applications. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gerardo Vega, Jesús E. Cuén-Ramos |
The Weight Distribution for an Extended Family of Reducible Cyclic Codes. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fengrong Zhang, Enes Pasalic, Nastja Cepak, Yongzhuang Wei |
Bent Functions in C and D Outside the Completed Maiorana-McFarland Class. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou |
A Median Nearest Neighbors LDA for Anomaly Network Detection. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun 0005 |
Some Results on the Known Classes of Quadratic APN Functions. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sylvain Guilley, Annelie Heuser, Olivier Rioul |
Codes for Side-Channel Attacks and Protections. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abdoul Aziz Ciss, Djiby Sow |
Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key Exchange. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Cunsheng Ding, Zhengchun Zhou |
Parameters of 2-Designs from Some BCH Codes. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti |
Efficient Implementation of Hybrid Encryption from Coding Theory. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet |
Spectral Approach for Correlation Power Analysis. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet, Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak |
Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sugata Gangopadhyay, Subhamoy Maitra, Nishant Sinha 0003, Pantelimon Stanica |
Quantum Algorithms Related to \textitHN -Transforms of Boolean Functions. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin |
On Isodual Cyclic Codes over Finite Chain Rings. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Said El Hajji 0001, Abderrahmane Nitaj, El Mamoun Souidi (eds.) |
Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore, Adeline Roux-Langlois |
Somewhat/Fully Homomorphic Encryption: Implementation Progresses and Challenges. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti |
A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sihem Mesnager, Pinar Ongan, Ferruh Özbudak |
New Bent Functions from Permutations and Linear Translators. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Berenger Edoukou Ayebie, Hafsa Assidi, El Mamoun Souidi |
A New Dynamic Code-Based Group Signature Scheme. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi |
Revisiting the Efficient Key Generation of ZHFE. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hind Idrissi, Mohammed Ennahbaoui, Said El Hajji 0001, El Mamoun Souidi |
A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | María Isabel García-Planas |
Families of Convolutional Codes over Finite Fields: A Survey. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hanane Bennasar, Ahmed Bendahmane, Mohammed Essaaidi |
An Overview of the State-of-the-Art of Cloud Computing Cyber-Security. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann 0001 |
Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Cheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose |
Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q. |
C2SI |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Manel Abdelhedi, Omessaad Hamdi, Ammar Bouallegue |
Performance of LDPC Decoding Algorithms with a Statistical Physics Theory Approach. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abderrahmane Nitaj, Tajjeeddine Rachidi |
New Attacks on RSA with Moduli N = p r q. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Faisal Nasim, Baber Aslam, Waseem Ahmed, Talha Naeem |
Uncovering Self Code Modification in Android. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marwa Ziadia, Mohamed Mejri |
Formal Enforcement of Security Policies on Parallel Systems with Risk Integration. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anne Canteaut, Joëlle Roué |
Differential Attacks Against SPN: A Thorough Analysis. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet |
On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abderrahmane Nitaj, Tajjeeddine Rachidi |
Factoring RSA Moduli with Weak Prime Factors. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Riham AlTawy, Mohamed Tolba, Amr M. Youssef |
A Higher Order Key Partitioning Attack with Application to LBlock. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Geihs, Denise Demirel, Johannes Buchmann 0001 |
On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huihui Yang, Vladimir A. Oleshchuk |
A Dynamic Attribute-Based Authentication Scheme. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thierry P. Berger, Nora El Amrani |
Codes over L(GF(2)m, GF(2)m) , MDS Diffusion Matrices and Cryptographic Applications. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Delphine Boucher |
A Note on the Existence of Self-Dual Skew Codes over Finite Fields. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ezedin Barka, Sujith Samuel Mathew, Yacine Atif |
Securing the Web of Things with Role-Based Access Control. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Noreddine El Janati El Idrissi, Said El Hajji 0001, Jean-Louis Lanet |
Countermeasures Mitigation for Designing Rich Shell Code in Java Card. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Said El Hajji 0001, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi (eds.) |
Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maleika Heenaye-Mamode Khan |
Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP). |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felix Ulmer |
Extended Abstract: Codes as Modules over Skew Polynomial Rings. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nadia El Mrabet, Emmanuel Fouotsa |
Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aicha Batoul, Kenza Guenda, T. Aaron Gulliver |
Repeated-Root Isodual Cyclic Codes over Finite Fields. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jesús Carrillo-Pacheco, Gerardo Vega, Felipe Zaldívar |
The Weight Distribution of a Family of Lagrangian-Grassmannian Codes. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Noureddine Chikouche, Cherif Foudil, Pierre-Louis Cayrel, Mohamed Benmohammed |
Weaknesses in Two RFID Authentication Protocols. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thierry P. Berger, Julien Francq, Marine Minier |
CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask. |
C2SI |
2015 |
DBLP DOI BibTeX RDF |
|