posted by user: ACSAT_2012 || 1148 views || tracked by 1 users: [display]

WADACP 2013 : Workshop on Advances in Development of Asymmetric Cryptographic Primitives

FacebookTwitterLinkedInGoogle

Link: http://dsr-conferences.co.uk/acsat/workshops2.php
 
When Dec 22, 2013 - Dec 24, 2013
Where Sarawak-Malaysia
Submission Deadline TBD
Categories    asymmetric design   asymmetric cryptanalysis   elliptic curve cryptography   digital signature design
 

Call For Papers

Asymmetric cryptographic primitives resolved the problem of key distribution that plagued secure communication up until 1976. It was in 1976 that Diffie, Hellman and Merkle founded a secure key exchange method and revolutionized secure communication. Then in 1978, Rivest, Shamir and Adleman published the world’s first public key encryption scheme now known as the RSA. Since then research interest in asymmetric cryptographic primitives increased. Namely this is due to the following objectives (not limited to and not in descending order of importance):

- To be able to utilize shorter keys
- To have faster speed
- To be able to increase data payload to be transmitted
- To be IND – CCA secure in the standard model
- To have simple mathematical structure for easy implementation
- To have a hard mathematical problem reasoning which is beyond conjecture
- To extend the mathematical proof on the restricted availability in obtaining solution and not only on existing computing in capabilities
- To be post quantum secure

Hence, the main purpose of this workshop is to provide an international discussion for academics, scientific researchers, engineers, and industrial partners for exchanging new ideas as well as the latest developments in this area of research. Secondary purpose is to promote research collaboration between participants from different countries and disciplines.

Topics (not limited to):

- Asymmetric design
- Asymmetric cryptanalysis
- Elliptic Curve Cryptography
- Digital signature design
- Integer Factorization
- Discrete Log Problem
- Lattices
- Provable secure asymmetric design
- Secure asymmetric implementation

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
Social Sustainability 2025   Twenty-first International Conference on Environmental, Cultural, Economic & Social Sustainability
BPMDS 2024   Business Process Modeling, Development, and Support
ACM ICAAI 2024   ACM--2024 The 8th International Conference on Advances in Artificial Intelligence (ICAAI 2024)
ICAAI 2024   ACM--2024 The 8th International Conference on Advances in Artificial Intelligence (ICAAI 2024)
Call for Chapters - CRC Press 2024   Internet of Things: Challenges and Advances
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
ARISDE 2024   1st International Workshop on Artificial Intelligence for Sustainable Development
CEESD-Ho Chi Minh City 2024   2024 9th International Conference on Environmental Engineering and Sustainable Development(CEESD 2024)
MDIS 2024   International Conference on Modelling and Development of Intelligent Systems