Codes, Cryptology and Information Security

Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji

  • Claude Carlet
  • Sylvain Guilley
  • Abderrahmane Nitaj
  • El Mamoun Souidi
Conference proceedings C2SI 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11445)

Also part of the Security and Cryptology book sub series (LNSC, volume 11445)

Table of contents

  1. Front Matter
    Pages i-xix
  2. Side-Channel Analysis

    1. Front Matter
      Pages 1-1
    2. Youssef Souissi, Adrien Facon, Sylvain Guilley
      Pages 3-12
    3. Sofiane Takarabt, Alexander Schaub, Adrien Facon, Sylvain Guilley, Laurent Sauvage, Youssef Souissi et al.
      Pages 13-30
    4. Robert Nguyen, Adrien Facon, Sylvain Guilley, Guillaume Gautier, Safwan El Assad
      Pages 31-39
  3. Cryptography

    1. Front Matter
      Pages 41-41
    2. Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup, Hirotaka Yoshida
      Pages 55-71
    3. Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay
      Pages 72-91
    4. Vincenzo Iovino, Ivan Visconti
      Pages 118-141
    5. Linru Zhang, Yuechen Chen, Jun Zhang, Meiqi He, Siu-Ming Yiu
      Pages 142-167
  4. Secret Sharing

    1. Front Matter
      Pages 169-169
    2. Matthias Geihs, Lucas Schabhüser, Johannes Buchmann
      Pages 171-194
    3. Sanyam Mehta, Vishal Saraswat, Smith Sen
      Pages 195-214
  5. Mathematics for Cryptography

    1. Front Matter
      Pages 215-215
    2. Sihem Mesnager, Kübra Kaytancı, Ferruh Özbudak
      Pages 217-235
  6. Codes and Their Applications

    1. Front Matter
      Pages 255-255
    2. Terry Shue Chien Lau, Chik How Tan
      Pages 269-287
    3. Soukaina Belabssir, Edoukou Berenger Ayebie, El Mamoun Souidi
      Pages 288-306
    4. Brice Odilon Boidje, Cheikh Thiecoumba Gueye, Gilbert Ndollane Dione, Jean Belo Klamti
      Pages 307-321
  7. Homomorphic Encryption

    1. Front Matter
      Pages 323-323
    2. Gerald Gavin, Stephane Bonnevay
      Pages 325-348
    3. Parthasarathi Das, Michael J. Jacobson Jr., Renate Scheidler
      Pages 349-368
  8. Applied Cryptography

    1. Front Matter
      Pages 369-369
    2. Grigory Kabatiansky
      Pages 371-380
    3. Yongge Wang, Qutaibah M. Malluhi
      Pages 381-398
    4. Augustin P. Sarr, Papa B. Seye, Togdé Ngarenon
      Pages 409-429
  9. Security

    1. Front Matter
      Pages 431-431
    2. George Teşeleanu
      Pages 452-461
    3. Gianpiero Cabodi, Paolo Camurati, Fabrizio Finocchiaro, Danilo Vendraminetto
      Pages 462-479
  10. Back Matter
    Pages 481-482

About these proceedings


This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.


artificial intelligence authentication cryptanalysis cryptography data security digital signature electronic document identification systems encryption information theory public key cryptography security semantics software engineering

Editors and affiliations

  1. 1.Université Paris 8Saint-DenisFrance
  2. 2.Institut MINES-TELECOMParisFrance
  3. 3.Université de CaenCaenFrance
  4. 4.Mohammed V UniversityRabatMorocco

Bibliographic information