Codes, Cryptology and Information Security: 4th International Conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023, Proceedings: Lecture Notes in Computer Science, cartea 13874
Editat de Said El Hajji, Sihem Mesnager, El Mamoun Souidien Limba Engleză Paperback – 19 mai 2023
The 21 full papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: Invited Papers, Cryptography, Information Security, Discrete Mathematics, Coding Theory.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 517.33 lei
Preț vechi: 646.65 lei
-20%
Puncte Express: 776
Preț estimativ în valută:
91.45€ • 109.04$ • 79.32£
91.45€ • 109.04$ • 79.32£
Carte tipărită la comandă
Livrare economică 16-30 martie
Specificații
ISBN-13: 9783031330162
ISBN-10: 3031330161
Ilustrații: XV, 408 p. 97 illus., 41 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031330161
Ilustrații: XV, 408 p. 97 illus., 41 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.59 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Invited Papers.- Cryptologists should not ignore the history of Al-Andalusia.- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems.- On Catalan Constant Continued Fractions.- Cryptography.- Full Post-Quantum Datagram TLS Handshake in the Internet of Things.- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes.- QCB is Blindly Unforgeable.- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts.- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments.- Attack on a Code-based Signature Scheme from QC-LDPC Codes.- Computational results on Gowers U2 and U3 norms of known S-Boxes.- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications.- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher.- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes.- Lattice-based accumulator with constant time list update and constant time verification.- Information Security.- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments.- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas.- A Study for Security of Visual Cryptography.- Forecasting Click Fraud via Machine Learning Algorithms.- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS.- Discrete Mathematics.- Symmetric 4-adic complexity of quaternary sequences with period 2p n.- Weightwise perfectly balanced functions and nonlinearity.- Chudnovsky-type algorithms over the projective line using generalized evaluation maps.- Coding Theory.- Security enhancement method using shortened error correcting codes.- An UpdatedDatabase of Z4 Codes and an Open Problem about Quasi-Cyclic Codes.