Codes, Cryptology, and Information Security

Codes, Cryptology, and Information Security -15% portes grátis

Codes, Cryptology, and Information Security

First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger

Carlet, Claude; Souidi, El Mamoun; El Hajji, Said; Nitaj, Abderrahmane

Springer International Publishing AG

05/2015

375

Mole

Inglês

9783319186801

15 a 20 dias

6088

Descrição não disponível.
Multidimensional Bell Inequalities and Quantum Cryptography.- Securing the Web of Things with Role-Based Access Control.- On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax.- Differential Attacks Against SPN: A Thorough Analysis.- On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions.- Beyond Cryptanalysis Is Software Security the Next Threat for Smart Cards.- Extended Abstract: Codes as Modules over Skew Polynomial Rings.- CUBE Cipher: A Family of Quasi-Involutive Block Ciphers Easy to Mask.- A Dynamic Attribute-Based Authentication Scheme.- Repeated-Root Isodual Cyclic Codes over Finite Fields.- Formal Enforcement of Security Policies on Parallel Systems with Risk Integration.- Countermeasures Mitigation for Designing Rich Shell Code in Java Card.- Weaknesses in Two RFID Authentication Protocols.- Square Code Attack on a Modified Sidelnikov Cryptosystem.- A Family of Six-Weight Reducible Cyclic Codes and their Weight Distribution.- Codes over L(GF(2)m,GF(2)m), MDS Diffusion Matrices and Cryptographic Applications.- A Higher Order Key Partitioning Attack with Application to LBlock.- A Note on the Existence of Self-Dual Skew Codes over Finite Fields.- he Weight Distribution of a Family of Lagrangian-Grassmannian Codes.- Algorithms of Constructing Linear and Robust Codes Based on Wavelet Decomposition and Its Application.- Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography.- Impossible Differential Properties of Reduced Round Streebog.- Security Issues on Inter-Domain Routing with QoS-CMS Mechanism.- Uncovering Self Code Modification in Android.- Performance of LDPC Decoding Algorithms with a Statistical Physics Theory Approach.- Representation of Dorsal Hand Vein Pattern Using Local Binary Patterns (LBP).- Watermarking Based Multi-biometric Fusion Approach.- New Attacks on RSA with Moduli N = prq.- Factoring RSA Moduli with Weak Prime Factors.
QoS management;RFID;Web of things;access control;authentication protocol;biometrics;coding theory;cryptanalysis;cryptography;digital signatures;fault attacks;hash functions;information-theoretic techniques;mathematical foundations of cryptography;mobile security;privacy;public key encryption;quantum cryptography;security protocols;smart card