3rd International Conference C2SI-2019 on

Codes, Cryptology and Information Security

In honor of Pr. Said El Hajji

April 22 - 24, 2019, Rabat - Morocco


Co-located With one-day Workshop on Side-Channel Analysis (SCA)

April 21, 2019, Rabat - Morocco


Sunday April 21st

See the program of one-day Workshop on Side-Channel Analysis

Monday April 22th

08h-09h Registration
Applied Cryptography I
9h-10h On the Tracing Traitors Math, Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing (Invited Talk) Grigory Kabatiansky
10h-10h30 Reusable Garbled Turing Machines without FHE Yongge Wang and Qutaibah M. Malluhi
10h30-11h Coffee Break
Applied Cryptography II
11h-12h Privacy Preserving Auctions on top of Ethereum (Invited Talk) Amr M. Youssef
12h-12h30 An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness Jingchen Yan, Yating Wang, Yuichi Goto and Jingde Cheng
12h30-14h Lunch
Applied Cryptography III
14h-15h Arabic Cryptography and Steganography in Morocco (Invited Talk) Abdelmalek Azizi
15h-15h30 A Practical and Insider Secure Signcryption with Non--Interactive Non--Repudiation Augustin P. Sarr, Papa B. Seye and Togdé Ngareno
15h30--16h Coffee Break
Secret Sharing
16h-16h30- Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments Matthias Geihs, Lucas Schabhüser and Johannes Buchmann
16h30-17h Secret Sharing using Near-MDS Codes Sanyam Mehta, Vishal Saraswat and Smith Sen

Tuesday April 23th

Codes and their Applications I
9h-10h On good polynomials over finite fields for optimal locally recoverable codes (Invited Talk) Sihem Mesnager
10h-10h30 A New Gabidulin-like Code and its Application in Cryptography Terry Shue Chien Lau and Chik How Tan
10h30-11h Coffee Break
11h-11h30- Perfect and Hamming and Simplex Linear Error-Block Codes with Minimum $ pi $-distance 3 Soukaina Belabssir, Edoukou Berenger Ayebie and El Mamoun Souidi
Codes and their Applications II
11h30-12h Quasi-Dyadic Girault Identification Scheme Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione and Jean Belo Klamti
Homomorphic Encryption
12h-12h30- Securely aggregating testimonies with Threshold Multi-key textsf{FHE Gerald Gavin and Stephane Bonnevay
12h30-13h- Improved Efficiency of a Linearly Homomorphic Cryptosystem Parthasarathi Das, Michael J. Jacobson and Renate Scheidler
13h-14h30 - Lunch
14h30-15h30 Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems (Invited Talk) Said El Hajji, Nabil Moukafih and Ghizlane Orhanou
15h30-16h Managing Your Kleptographic Subscription Plan George Te c seleanu
16h-16h30 Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification Gianpiero Cabodi, Paolo Camurati, Fabrizio Finocchiaro and Danilo Vendraminetto
16h30-17h Coffee Break
Mathematics for Cryptography
17h-17h30 On Plateaued Functions and Linear Structures and Permutation Polynomials Sihem Mesnager, Kübra Kaytanci and Ferruh Özbudak
17h30-18h Faster Scalar Multiplication on the $x$-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains Hairong Yi, Guiwen Luo and Dongdai Lin
18h Ceremony in honor of Professor Said El Hajji - Amphi Belmahi

Wednesday April 24th

Cryptography I
9h-10h An AEAD variant of the Grain stream cipher (Invited Talk) Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup and Hirotaka Yoshida
10h-10h30 Construction for a Nominative Signature Scheme from Lattice with Enhanced Security Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay
10h30-11h Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG George Teceleanu
11h-11h30- Coffee Break
Cryptography II
11h30-12h A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem Jintai Ding, Kevin Schmitt and Zheng Zhang
12h-12h30- Non-Interactive Zero Knowledge { em Proofs in the Random Oracle Model Vincenzo Iovino and Ivan Visconti
12h30-13h From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He and Siu-Ming Yiu
13h-14h30 Lunch
15h Social Event