Limit search to available items
Book Cover
E-book
Author C2SI (Conference) (1st : 2015 : Rabat, Morocco)

Title Codes, cryptology, and information security : first International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings -- In honor of Thierry Berger / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi
Published Cham : Springer, 2015

Copies

Description 1 online resource (xxvi, 375 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 9084
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 9084. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; Preface; Organization; Contents; Invited Papers; Multidimensional Bell Inequalities and Quantum Cryptography; 1 Local Realism and CHSH Inequalities; 1.1 Local Realism; 1.2 CHSH Inequalities; 1.3 Quantum World; 1.4 Complete Set of Inequalities; 1.5 Generalization to; 2 Multidimensional Inequalities; 2.1 Discrete Fourier Transform; 2.2 Homogeneous Inequalities; 3 Violation by Quantum Systems; 3.1 Measurements with Tritters; 4 Quantum Keys Exchange; 4.1 Ekert'91 Protocol; 4.2 The Inequality CHSH-3; 4.3 The 3DEB Protocol; 4.4 The Homogeneous Qutrits Protocol; 5 Conclusion; References
Securing the Web of Things with Role-Based Access Control1 Introduction; 2 Overview of WoT; 2.1 Representation of Things on WoT; 2.2 Ambient Space Stakeholders; 2.3 WoT Framework; 2.4 WoT Security Challenges; 3 Overview of Role Based Access Control (RBAC) Model; 4 Security Architecture for WoT; 4.1 Integrating RBAC in WoT; 4.2 Policy Enforcement Facitilies; 4.3 Areas of Control Architecture; 5 WOT Resources Protection; 5.1 Documents and Views; 5.2 Key Generation and Encryption; 6 Conclusion and Future Work; References
On the Security of Long-Lived Archiving Systems Based on the Evidence Record Syntax1 Introduction; 2 ERS Archiving System; 2.1 Setup; 2.2 ERS Specification; 3 Security Framework; 3.1 Task-PIOAs; 3.2 Longterm Implementation Relation; 3.3 CIS System Model; 4 ERS System Model; 4.1 Construction Overview; 4.2 Signature Service; 4.3 Timestamp Service; 4.4 Hash Service; 4.5 Service Times; 4.6 Dispatcher; 4.7 ERS Service; 5 ERSSecurityProof; 6 Conclusions; References; Differential Attacks Against SPN: A Thorough Analysis; 1 Introduction
2 Differential Attacks Against Substitution-Permutation Networks2.1 Substitution-Permutation Networks; 2.2 Differential Cryptanalysis; 2.3 Expected Probability of a Differential Characteristic; 3 From Characteristics to Differentials; 3.1 Expected Probability of a 2-round Differential; 3.2 Influence of the Weight of the Differential; 3.3 Number of Characteristics Within a Given 2-round Differential; 4 SPNwithanAPNSbox; 4.1 APN Sboxes over F8; 4.2 APN Sboxes over F32; 5 MEDP2 can be Tight for a Differential of Non-minimal Weight; 5.1 Examples where MEDP2 is Tight for a Differential of Weight)
5.2 Example where MEDP2 is Tight for a Differential of Weight (6 Conclusions; References; On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Boolean and Vectorial Functions; 3.1 Characterization by Means of the Derivatives; 3.2 Characterization by Means of Power Moments of the Walsh Transform; 4 Characterizations of the APN-ness of Componentwise Plateaued Vectorial Functions; 4.1 Characterization by the Derivatives; 4.2 Characterization by the Walsh Transform
Summary This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed May 15, 2015)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Internet -- Security measures -- Congresses
Computer security
Data encryption (Computer science)
Internet -- Security measures
Genre/Form proceedings (reports)
Festschriften
Conference papers and proceedings
Conference papers and proceedings.
Festschriften.
Actes de congrès.
Form Electronic book
Author El Hajji, Said, editor
Nitaj, Abderrahmane, editor.
Carlet, Claude, editor.
Souidi, El Mamoun, editor
ISBN 9783319186818
3319186817
3319186809
9783319186801
Other Titles C2SI 2015