AFRICACRYPT 2010, May 03-06, 2010, Stellenbosch, South Africa
After two successful Africacrypts (Africacrypt
2009 in Gammarth, Tunisia and Africacrypt 2008 in Casablanca,
Morocco), Africacrypt 2010 will take place in Stellenbosch, South Africa.
For more information, such as program, registration, practical matters see:
http://2010.africacrypt.com
Call for papers:
The conference seeks original contributions in cryptology: We welcome
submissions about new cryptographic primitive proposals,
cryptanalysis, security models, hardware and software implementation
aspects, cryptographic protocols and applications. We also consider
submissions about cryptographic aspects of network security,
complexity theory, information theory, coding theory, number theory,
and quantum computing.
The proceedings of Africacrypt 2010 will be published by Springer Verlag
as Volume
6055 in the
Lecture Notes in Computer Science (LNCS) series. The proceedings
will be available during the conference.
Important deadlines and dates (revised):
January 05, 2010: | registration of paper (title, abstract) |
January 10, 2010: | submission deadline |
February 19, 2010: | notification of acceptance or rejection |
February 28, 2010: | revised version of accepted papers due |
May 03-06, 2010: | Africacrypt 2010 |
No new submissions will be accepted after the submission of abstracts
deadline (Jan 05); it is still possible to modify the submissions
until Jan 10.
Instructions for Authors of Papers
Submissions must not substantially duplicate work that any of the
authors has published elsewhere or has submitted in parallel to any
other conference or workshop with formally published
proceedings. Information about submissions may be shared with program
chairs of other conferences for the purpose of detecting
duplication. Accepted submissions may not appear in any other
conference or workshop with proceedings.
Submissions must be anonymous, with no author names, affiliations,
acknowledgments, or obvious references. Each submission should begin
with a title, a short abstract, and a list of keywords, and an
introduction that summarizes the contributions of the paper at a level
appropriate for a non-specialist reader. Submissions not meeting these
guidelines risk rejection without consideration of their merits.
The page limit for submissions is 18 pages
in LNCS format (see http://www.springeronline.com/lncs)
including references and appendices.
Up to 12 pages of additional
supporting information may be provided, but committee members will
read this information at their discretion, so the paper should be
intelligible and self-contained within the 18 page LNCS limit.
The final versions of accepted papers will be limited to
18 pages including references and appendices.
Papers must be submitted electronically. A detailed description of the
electronic submission procedure is available at
https://www.hyperelliptic.org/conferences/iChair/
Submissions must conform to this procedure. Late submissions and
non-electronic submissions will not be considered. No new submissions
will be accepted after the submission of abstracts deadline (Jan 05);
it is still possible to modify the submissions until Jan 10. Authors
of accepted papers must guarantee that their paper will be presented
at the conference.
Accepted papers will be published in
Springer-Verlag's Lecture Notes in Computer Science and will be
available at the conference. Instructions about the preparation of a
final proceedings version will be sent to the authors of accepted
papers.
Program Committee
Michel Abdalla, Ecole Normale Superieure, France
Roberto Avanzi, Ruhr-University Bochum, Germany
Hatem M. Bahig, Ain Shams University, Egypt
Paulo S. L. M. Barreto, University of São Paulo, Brazil
Lejla Batina, Radboud University Nijmegen and KU Leuven, Netherlands and Belgium
Daniel J. Bernstein, University of Illinois at Chicago, USA
Ashraf M. Bhery, Ain Shams University, Egypt
Peter Birkner, Université de Versailles Saint-Quentin-en-Yvelines, France
Colin Boyd, Queensland University of Technology, Australia
Xavier Boyen, University of Liege, Belgium
Johannes Buchmann, TU Darmstadt, Germany
Christophe De Cannière, Katholieke Universiteit Leuven, Belgium
Chen-Mou Cheng, National Taiwan University, Taiwan
Carlos Cid, Royal Holloway, University of London, UK
Alexander W. Dent, Royal Holloway, University of London, UK
Yvo Desmedt, University College London, UK and RCIS, AIST, Japan
Christophe Doche, Macquarie University, Australia
Orr Dunkelman, Weizmann Institute, Israel
Matthieu Finiasz, ENSTA, France
Shay Gueron, University of Haifa and Intel Corporation, Israel
Tim Güneysu, Ruhr-University Bochum, Germany
Helena Handschuh, Katholieke Universiteit Leuven, Belgium and Intrinsic-ID, USA
Antoine Joux, DGA and University of Versailles Saint-Quentin-en-Yvelines, France
Marc Joye, Technicolor, France
Tanja Lange, Technische Universiteit Eindhoven, Netherlands
Keith Martin, Royal Holloway, University of London, UK
Mitsuru Matsui, Mitsubishi Electric, Japan
David McGrew, Cisco, USA
Alfred Menezes, University of Waterloo, Canada
Michele Mosca, University of Waterloo, Canada
Michael Naehrig, Microsoft Research, USA
Abderrahmane Nitaj, Université de Caen, France
Elisabeth Oswald, University of Bristol, UK
Christof Paar, Ruhr-University Bochum, Germany
Daniel Page, University of Bristol, UK
Josef Pieprzyk, Macquarie University, Australia
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Christian Rechberger, Katholieke Universiteit Leuven, Belgium
Magdy Saeb, Arab Academy for Science, Technology & Maritime Transport, Egypt
Palash Sarkar, Indian Statistical Institute, India
Berry Schoenmakers, Technische Universiteit Eindhoven, Netherlands
Michael Scott, Dublin City University, Ireland
Nicolas Sendrier, INRIA, France
Francesco Sica, University of Calgary, Canada
Martijn Stam, EPFL, Switzerland
François-Xavier Standaert, Universite catholique de Louvain, Belgium
Damien Stehlé, CNRS/University of Sydney/Macquarie University, France/Australia/Australia
Christine Swart, University of Cape Town, South Africa
Mike Szydlo, Akamai, USA
Brent Waters, University of Texas at Austin, USA
Michael J. Wiener, Cryptographic Clarity, Canada
Bo-Yin Yang, Academia Sinica, Taiwan
Amr M. Youssef, Concordia University, Canada
Paul Zimmermann, INRIA Nancy - Grand Est, France
Conference chairs:
Program Chairs:
Daniel J. Bernstein
University of Illinois at Chicago
USA
Tanja Lange
Technische Universiteit Eindhoven
Netherlands
General chairs:
Riaal Domingues
South African Communications and Security Agency
South Africa
Dr. Christine Swart
University of Cape Town
South Africa
Accepted papers
Signatures
A New RSA-Based Signature Scheme
Sven Schäge, Jörg Schwenk
Fair Blind Signatures without Random Oracles
Georg Fuchsbauer, Damien Vergnaud
Fair Partially Blind Signatures
Markus Rückert, Dominique Schröder
Attacks
Parallel Shortest Lattice Vector Enumeration on Graphics Cards
Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, Bart Preneel
Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over F2
Johannes Buchmann, Daniel Cabarcas, Jintai Ding, Mohamed Saied Emam Mohamed
Factoring RSA Modulus using Prime Reconstruction from Random
Known Bits
Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta
Protocols
Proofs of Restricted Shuffles
Björn Terelius, Douglas Wikström
Batch Range Proof For Practical Small Ranges
Kun Peng, Feng Bao
Optimistic Fair Priced Oblivious Transfer
Alfredo Rial, Bart Preneel
Networks
Information-Theoretically Secure Key-Insulated Multireceiver
Authentication Codes
Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu
Matsumoto
Simple and Communication Complexity Efficient Almost Secure and
Perfectly Secure Message Transmission Schemes
Yvo Desmedt, Stelios Erotokritou, Reihaneh Safavi-Naini
Communication Efficient Perfectly Secure VSS and MPC in
Asynchronous Networks with Optimal Resilience
Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Elliptic curves
Avoiding Full Extension Field Arithmetic in Pairing Computations
Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth
Koon-Ho Wong
ECC2K-130 on Cell CPUs
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, Peter
Schwabe
Side-channel attacks and fault attacks
Practical Improvements of Profiled Side-Channel Attacks on a
Hardware Crypto-Accelerator
M. Abdelaziz Elaabid, Sylvain Guilley
Differential Fault Analysis of HC-128
Aleksandar Kircanski, Amr M. Youssef
Fresh Re-Keying: Security against Side-Channel and Fault Attacks for
Low-Cost Devices
Marcel Medwed, François-Xavier Standaert, Johann Großschädl, Francesco Regazzoni
Public-key encryption
Strong Cryptography from Weak Secrets: Building Efficient PKE and
IBE from Distributed Passwords
Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David
Pointcheval
Efficient Unidirectional Proxy Re-Encryption
Sherman S.M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng
Public-Key Encryption with Non-Interactive Opening: New
Constructions and Stronger Definitions
David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer,
Anja Lehmann, Mark Manulis, Dominique Schröder
Keys and PUFs
Flexible Group Key Exchange with On-Demand Computation of
Subgroup Keys
Michel Abdalla, Céline Chevalier, Mark Manulis, David Pointcheval
Quantum readout of Physical Unclonable Functions
Boris Škorić
Ciphers and hash functions
Parallelizing the Camellia and SMS4 Block Ciphers
Huihui Yap, Khoongming Khoo, Axel Poschmann
Improved Linear Differential Attacks on CubeHash
Shahram Khazaei, Simon Knellwolf, Willi Meier, Deian Stefan
Cryptanalysis of the 10-Round Hash and Full Compression Function of
SHAvite-3-512
Praveen Gauravaram, Gaëtan Leurent, Florian Mendel, María Naya-Plasencia, Thomas Peyrin, Christian Rechberger, Martin
Schläffer
Sponsors
| CIMPA (International Centre for Pure and Applied Mathematics) is a non-profit international organization established in Nice (France) in 1978. Its aim is to promote international cooperation in higher education and research in mathematics and related subjects, particularly computer science, for the benefit of developing countries. |
|
Prism, a subsidiary of NET1 UEPS Technologies, Inc., is a Trusted Transactions company that develops innovative payment-centric products, solutions and services that enable and process secure electronic transactions. Prism operates mainly within the telecommunications, banking, retail, petroleum and utilities sectors.
NET1 provides chip card technologies and systems such as its Universal Electronic Payment System (UEPS) to establish a secure and affordable transacting channel between formal businesses and the un-banked and under-banked populations of developing economies.
|