© 2017

Codes, Cryptology and Information Security

Second International Conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017, Proceedings - In Honor of Claude Carlet

  • Said El Hajji
  • Abderrahmane Nitaj
  • El Mamoun Souidi
Conference proceedings C2SI 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10194)

Also part of the Security and Cryptology book sub series (LNSC, volume 10194)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Invited Papers

    1. Front Matter
      Pages 1-1
    2. Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun
      Pages 3-16
    3. Sylvain Guilley, Annelie Heuser, Olivier Rioul
      Pages 35-55
    4. H. Bennasar, A. Bendahmane, M. Essaaidi
      Pages 56-67
    5. Guillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore et al.
      Pages 68-82
  3. Regular Papers

    1. Front Matter
      Pages 83-83
    2. Cunsheng Ding, Zhengchun Zhou
      Pages 110-127
    3. Zyad Elkhadir, Khalid Chougdali, Mohammed Benattou
      Pages 128-141
    4. Patrick Struck, Lucas Schabhüser, Denise Demirel, Johannes Buchmann
      Pages 142-160
    5. Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin
      Pages 161-175
    6. Aicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin
      Pages 176-194
    7. Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi
      Pages 195-212
    8. Gerardo Vega, Jesús E. Cuén-Ramos
      Pages 213-229
    9. Thierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti
      Pages 230-237
    10. Philippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet
      Pages 238-253
    11. Pierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti
      Pages 254-264

About these proceedings


This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.

The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 72 submissions. The first aim of this conference is to pay homage to Claude Carlet for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography worldwide, especially in Africa. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.


Mathematical foundations of cryptography Security protocols Public key encryption Information-theoretic techniques Digital signatures cloud computing encryption schemes post quantum cryptography authenticated encryption code-based cryptography coding theory cryptanalysis and other attacks elliptic curves mobile agent multivariate cryptography nearest neighbor network anomaly detection quadratic function randomness security

Editors and affiliations

  • Said El Hajji
    • 1
  • Abderrahmane Nitaj
    • 2
  • El Mamoun Souidi
    • 3
  1. 1.University of Mohammed VRabatMorocco
  2. 2.University of CaenCaenFrance
  3. 3.University of Mohammed VRabatMorocco

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment