In honor of Professor Thierry BERGER
International Conference in "Codes, Cryptology and Information Security"


Mohammed V University, Rabat, Morocco
Faculty of Sciences
May 26 - 28, 2015

Download Poster of C2SI-BERGER2015


C2SI-Berger2015 is in cooperation with
International Association for Cryptologic Research "IACR"

    style= LNCS, Volume 9084, 2015 "Codes, Cryptology, and Information Security"
Conference Program
Visit Atlas


Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Accepted submissions must not appear in any other conference or workshop with proceedings. The submission must be in English. It must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits. Since the final version of accepted papers will have to follow the LNCS guidelines in LaTeX with a total page limit of 18 pages including references and appendices, it is advised to submit in the same format. Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length.

Information about LNCS format can be found on

Papers must be submitted electronically through

Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered. Authors of accepted papers must guarantee that their paper will be presented at the conference.


Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.


Topics of interest include but are not limited to:

Coding theory
Cryptosystems based on codes
Spread spectrum
Information Security
Identification, Authentication and Non-repudiation
Information Hiding
Intrusion Detection & Prevention
Security and Privacy
Security Protocols
Mobile Security
Ad Hoc Network Security


New Submission deadline: February 15, 2015 23:59 pm (GMT Time)
Authors Notification: March 20, 2015
Camera Ready: March 25, 2015
Early Registration: April 15, 2015

Conference Date: 26 - 28 May, 2015


International Conference in "Codes, Cryptology and Information Security" in Honor of Professor Thierry BERGER
Contact :    elhajji(at)fsr.ac.ma,    emsouidi(at)gmail.com,    orhanou(at)fsr.ac.ma