4th International Conference C2SI-2023 on
Codes, Cryptology and Information Security
In honor of Pr. Jean-Louis LANET
Faculty of Sciences, Rabat - Morocco
May 29-31, 2023
Accepted papers
Invited Papers
- Yvo Desmedt
Cryptologists should not ignore the history of Al-Andalusia
- Loïc Bidoux and Philippe Gaborit
Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems
- David Naccache and Ofer Yifrach-Stav
On Catalan Constant Continued Fractions
Cryptography
- Callum McLoughlin, Clementine Gritti and Juliet Samandari
Full Post-Quantum Datagram TLS Handshake in the Internet of Things
- Ousmane Ndiaye
Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes
- Jannis Leuther and Stefan Lucks
QCB is Blindly Unforgeable
- Ruize Wang and Elena Dubrova
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts
- Hussain Ahmad and Carolin Hannusch
A new keyed hash function based on latin squares and error-correcting codes to authenticate users in smart home environments
- Theo Fanuela Prabowo and Chik How Tan
Attack on a Code-based Signature Scheme from QC-LDPC Codes
- Vikas Kumar, Bimal Mandal, Aditi Gangopadhyay and Sugata Gangopadhyay
Computational results on Gowers U2 and U3 norms of known S-Boxes
- Artem Grigir, Vincenzo Iovino and Răzvan Roşie
Multi-Input Non-Interactive Functional Encryption: Constructions and Applications
- Sayantan Paul, Abishanka Saha and Mridul Nandi
Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher
- Maya Chartouny, Jacques Patarin and Ambre Toulemonde
Quantum Cryptanalysis of $5$ rounds Feistel schemes and Benes schemes
- Yuta Maeno, Hideaki Miyaji and Atsuko Miyaji
Lattice-based accumulator with constant time list update and constant time verification
Information Security
- Ngoc Minh Phung and Mamoru Mimura
Malicious JavaScript detection based on AST analysis and key feature re-sampling in Realistic Environment
- Diana Maimut, Evgnosia-Alexandra Kelesidis and Ilona Teodora Ciocan
Searching for Gemstones: Flawed Stegosystems May Hide Promissing Ideas
- Binh Le Thanh Thai and Hidema Tanaka
A Study for Security of Visual Cryptography
- Nadir Sahllal and El Mamoun Souidi
Forecasting Click Fraud via Machine Learning Algorithms
- Hind Idrissi and Mohammed Ennahbaoui
An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS
Discrete Mathematics
- Vladimir Edemskiy and Sofia Koltsova
Symmetric 4-adic complexity of quaternary sequences with period $2p^n$
- Agnese Gini and Pierrick Méaux
Weightwise perfectly balanced functions and nonlinearity
- Bastien Pacifico and Stéphane Ballet
Chudnovsky-type algorithms over the projective line using generalized evaluation maps
Error Coding Theory
- Tomohiro Sekiguchi and Hidema Tanaka
Security enhancement method using shortened error correcting codes
- Nuh Aydin, Yiyang Lu and Vishad Onta
An Updated Database of Z4 Codes and an Open Problem about Quasi-Cyclic Codes
contact(at)c2si-conference.org
Sponsors