Codes, Cryptology, and Information Security

First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger

  • Said El Hajji
  • Abderrahmane Nitaj
  • Claude Carlet
  • El Mamoun Souidi
Conference proceedings C2SI 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9084)

Also part of the Security and Cryptology book sub series (LNSC, volume 9084)

Table of contents

  1. Front Matter
    Pages 1-23
  2. Invited Papers

  3. Regular Papers

    1. Front Matter
      Pages 87-87
    2. Thierry P. Berger, Julien Francq, Marine Minier
      Pages 89-105
    3. Huihui Yang, Vladimir A. Oleshchuk
      Pages 106-118
    4. Aicha Batoul, Kenza Guenda, T. Aaron Gulliver
      Pages 119-132
    5. Noreddine El Janati El Idrissi, Said El Hajji, Jean-Louis Lanet
      Pages 149-161
    6. Noureddine Chikouche, Foudil Cherif, Pierre-Louis Cayrel, Mohamed Benmohammed
      Pages 162-172
    7. Ayoub Otmani, Hervé Talé Kalachi
      Pages 173-183
    8. Riham AlTawy, Mohamed Tolba, Amr M. Youssef
      Pages 215-227
    9. Jesús Carrillo-Pacheco, Gerardo Vega, Felipe Zaldívar
      Pages 240-246
    10. Ahmed Abdelkhalek, Riham AlTawy, Amr M. Youssef
      Pages 274-286
    11. Hafssa Benaboud, Sara Bakkali, José Johnny Randriamampionona
      Pages 287-296
    12. Faisal Nasim, Baber Aslam, Waseem Ahmed, Talha Naeem
      Pages 297-313
    13. Manel Abdelhedi, Omessaad Hamdi, Ammar Bouallegue
      Pages 314-330
    14. Abderrahmane Nitaj, Tajjeeddine Rachidi
      Pages 352-360
    15. Abderrahmane Nitaj, Tajjeeddine Rachidi
      Pages 361-374
  4. Back Matter
    Pages 375-375

About these proceedings


This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015.

The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.


QoS management RFID Web of things access control authentication protocol biometrics coding theory cryptanalysis cryptography digital signatures fault attacks hash functions information-theoretic techniques mathematical foundations of cryptography mobile security privacy public key encryption quantum cryptography security protocols smart card

Editors and affiliations

  • Said El Hajji
    • 1
  • Abderrahmane Nitaj
    • 2
  • Claude Carlet
    • 3
  • El Mamoun Souidi
    • 4
  1. 1.University of Mohammed VRabatMorocco
  2. 2.University of CaenCaenFrance
  3. 3.LAGA,Universities of Paris 8 and Paris 13Saint-Denis Cedex 02France
  4. 4.University of Mohammed VRabatMorocco

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-18680-1
  • Online ISBN 978-3-319-18681-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment