000 | 04462nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-33017-9 | ||
003 | DE-He213 | ||
005 | 20240730170357.0 | ||
007 | cr nn 008mamaa | ||
008 | 230518s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031330179 _9978-3-031-33017-9 |
||
024 | 7 |
_a10.1007/978-3-031-33017-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCodes, Cryptology and Information Security _h[electronic resource] : _b4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings / _cedited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXV, 408 p. 97 illus., 41 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13874 |
|
505 | 0 | _aInvited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An UpdatedDatabase of Z4 Codes and an Open Problem about Quasi-Cyclic Codes. | |
520 | _aThis book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29-31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aEl Hajji, Said. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993072 |
|
700 | 1 |
_aMesnager, Sihem. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993073 |
|
700 | 1 |
_aSouidi, El Mamoun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _993074 |
|
710 | 2 |
_aSpringerLink (Online service) _993075 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031330162 |
776 | 0 | 8 |
_iPrinted edition: _z9783031330186 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13874 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-33017-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86878 _d86878 |