000 | 04425nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-031-33017-9 | ||
003 | DE-He213 | ||
005 | 20240423125106.0 | ||
007 | cr nn 008mamaa | ||
008 | 230518s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031330179 _9978-3-031-33017-9 |
||
024 | 7 |
_a10.1007/978-3-031-33017-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aCodes, Cryptology and Information Security _h[electronic resource] : _b4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings / _cedited by Said El Hajji, Sihem Mesnager, El Mamoun Souidi. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXV, 408 p. 97 illus., 41 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13874 |
|
505 | 0 | _aInvited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography -- Full Post-Quantum Datagram TLS Handshake in the Internet of Things -- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes -- QCB is Blindly Unforgeable -- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts -- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments -- Attack on a Code-based Signature Scheme from QC-LDPC Codes -- Computational results on Gowers U2 and U3 norms of known S-Boxes -- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications -- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher -- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes -- Lattice-based accumulator with constant time list update and constant time verification -- Information Security -- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments -- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas -- A Study for Security of Visual Cryptography -- Forecasting Click Fraud via Machine Learning Algorithms -- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS -- Discrete Mathematics -- Symmetric 4-adic complexity of quaternary sequences with period 2p n -- Weightwise perfectly balanced functions and nonlinearity -- Chudnovsky-type algorithms over the projective line using generalized evaluation maps -- Coding Theory -- Security enhancement method using shortened error correcting codes -- An UpdatedDatabase of Z4 Codes and an Open Problem about Quasi-Cyclic Codes. | |
520 | _aThis book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory. | ||
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aData and Information Security. |
700 | 1 |
_aEl Hajji, Said. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMesnager, Sihem. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSouidi, El Mamoun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031330162 |
776 | 0 | 8 |
_iPrinted edition: _z9783031330186 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13874 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-33017-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c174141 _d174141 |