| |||||||||||||
AFRICACRYPT 2009 : Second African International Conference on CryptologyConference Series : International Conference on Cryptology in Africa | |||||||||||||
Link: http://www.africacrypt2009.tn/ | |||||||||||||
| |||||||||||||
Call For Papers | |||||||||||||
AFRICACRYPT 2009
June 21-25, 2009, Gammarth, Tunisia Submission: January 6, 2009 Poster Submission: February 2, 2009 Notification (for papers and posters): March 5, 2009 Final Version: March 30, 2009 General Information Original papers on all technical aspects of cryptology are solicited for submission to Africacrypt 2009. The conference is organized by the Tunisian National Digital Certification Agency in cooperation with IACR. For more information see http://www.africacrypt2009.tn/. The conference seeks original contributions in any area of cryptology or related fields. We welcome submissions about new cryptographic primitive proposals, cryptanalysis, security models, hardware and software implementation aspects, cryptographic protocols and applications. We also consider submissions about cryptographic aspects of network security, complexity theory, information theory, coding theory, number theory, and quantum computing. Instructions for Authors of Papers Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Accepted submissions may not appear in any other conference or workshop with proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits. Since the final version of accepted papers will have to follow the LNCS guidelines (see http://www.springeronline.com/lncs) with a total page limit of 18 pages including references and appendices, it is mandatory to submit in the same format. Up to 12 pages of additional supporting information may be provided, but committee members will read this information at their discretion, so the paper should be intelligible and self-contained within the 18 page LNCS limit. Papers must be submitted electronically. A detailed description of the electronic submission procedure will be made available at the conference website. Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered. Authors of accepted papers must guarantee that their paper will be presented at the conference. It is the intention that accepted papers will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Instructions for Authors of Posters In addition to the mainstream session, Africacrypt 2009 will have a poster session. Authors who want to present a poster are encouraged to send an anonymous article of 4 to 10 pages in LNCS format (and without supporting information). This limit will be strictly enforced. A printout of abstracts of the posters will be made available to the conference participants. Authors of accepted abstracts for the poster session must guarantee that they will have a poster presenting the technical content of their abstract available for presentation at the conference poster session. Posters will not appear in the LNCS proceedings. Program Committee Michel Abdalla, ENS, Paris, France Paulo Barreto, University of Sao Paulo (USP), Brazil Tom Berson, Anagram, USA Anne Canteaut, INRIA Paris-Rocquencourt, France Dario Catalano, University of Catania, Italy Herve Chabanne, SAGEM, France Jean-Marc Couveignes, Université Toulouse 2, France Kris Gaj, George Mason University, USA Henri Gilbert, Orange Labs, France Helena Handschuh, Spansion, France Martin Hirt, ETH Zurich, Switzerland Seokhie Hong, Korea University, Korea Tetsu Iwata, Nagoya University, Japan Yassine Lakhnech, University Joseph Fourier-Grenoble, France Tanja Lange, T.U.Eindhoven, The Netherlands Yiqun Lisa Lin, USA Helger Lipmaa, Cybernetica AS, Estonia Keith Martin, Royal Holloway University of London, UK Mitsuru Matsui, Mitsubishi Electric, Japan Sihem Mesnager, University of Paris 8, France Kaisa Nyberg, Helsinki University of Technology and Nokia, Finland Sami Omar, University of Tunis, Tunisia Elisabeth Oswald, University of Bristol, UK Bart Preneel (chair), K.U.Leuven, Belgium Alexander May, R.U.Bochum, Germany Rei Safavi-Naini, University of Calgary, Canada Kazue Sako, NEC, Japan Ali Aydin Selcuk, Bilkent University, Turkey Christine Swart, University of Cape Town, South Africa Serge Vaudenay, EPFL, Switzerland Frederik Vercauteren, K.U.Leuven, Belgium Michael Wiener, Cryptographic Clarity, Canada Conference chairs : Program Chair: Bart Preneel Katholieke Universiteit Leuven Dept. Electrical Engineering-ESAT/COSIC Kasteelpark Arenberg 10 Bus 2446, B-3001 Leuven, Belgium Email: firstname.lastname(AT)esat.kuleuven.be General chair: Sami Ghazali Tunisian National Digital Certification Agency Parc Technologique El Ghazala, Route de Raoued Km 3,5 - 2083 Ariana, Tunisia Email: firstname.lastname(AT)certification.tn Co-chair: Sami Omar University of Tunis ESSTT, Department of Mathematics, Tunisia Email: firstname.lastname(AT)fst.rnu.tn |
|