Codes, Cryptology, and Information Security

First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger

  • Said El Hajji
  • Abderrahmane Nitaj
  • Claude Carlet
  • El Mamoun Souidi
Conference proceedings C2SI 2015

DOI: 10.1007/978-3-319-18681-8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9084)

Table of contents

  1. Front Matter
    Pages 1-23
  2. Invited Papers

  3. Regular Papers

    1. Front Matter
      Pages 87-87
    2. Thierry P. Berger, Julien Francq, Marine Minier
      Pages 89-105
    3. Huihui Yang, Vladimir A. Oleshchuk
      Pages 106-118
    4. Aicha Batoul, Kenza Guenda, T. Aaron Gulliver
      Pages 119-132
    5. Noreddine El Janati El Idrissi, Said El Hajji, Jean-Louis Lanet
      Pages 149-161
    6. Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed
      Pages 162-172
    7. Ayoub Otmani, Hervé Talé Kalachi
      Pages 173-183
    8. Riham AlTawy, Mohamed Tolba, Amr M. Youssef
      Pages 215-227

About these proceedings

Introduction

This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.

The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.

Keywords

QoS management RFID Web of things access control authentication protocol biometrics coding theory cryptanalysis cryptography digital signatures fault attacks hash functions information-theoretic techniques mathematical foundations of cryptography mobile security privacy public key encryption quantum cryptography security protocols smart card

Editors and affiliations

  • Said El Hajji
    • 1
  • Abderrahmane Nitaj
    • 2
  • Claude Carlet
    • 3
  • El Mamoun Souidi
    • 4
  1. 1.University of Mohammed VRabatMorocco
  2. 2.University of CaenCaenFrance
  3. 3.LAGA,Universities of Paris 8 and Paris 13Saint-Denis Cedex 02France
  4. 4.University of Mohammed VRabatMorocco

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-18680-1
  • Online ISBN 978-3-319-18681-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349