posted by organizer: Africacrypt || 1905 views || tracked by 4 users: [display]

Africacrypt 2014 : International Conference on the Theory and Applications of Cryptology


Conference Series : International Conference on Cryptology in Africa
When May 28, 2014 - May 30, 2014
Where Marrakech
Submission Deadline Jan 15, 2014
Notification Due Mar 1, 2014
Final Version Due Mar 17, 2014
Categories    secret-key cryptography   public-key cryptography   design of cryptographic scheme   information theory

Call For Papers

7th International Conference on Cryptology AFRICACRYPT 2014
May 28,30, 2014, Marrakech, Morocco

Africacrypt is an Annual International Conference on the Theory and Applications of Cryptology. Africacrypt 2014 is organized by the ENSIAS School of Engineering and the University Mohamed V Souissi, Rabat, in cooperation with the International Association for Cryptologic Research (IACR).
The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications.
The conference seeks original contributions in any area of cryptology or related elds. We welcome submissions about, but not limited to:
•Secret-key cryptography (block ciphers, stream ciphers, hash functions, MAC, etc)
•Secret-key cryptanalysis
•Public-keycryptography(identcation protocols, digital signatures, encryption, etc)
•Public-key cryptanalysis
•Cryptographic protocols
•Design of cryptographic schemes
•Security proofs
•Anonymity (electronic commerce and payment, electronic voting, etc)
•Information theory
•Foundations and complexity theory
•Elliptic curves, lattices and coding theory
•Efficient implementations and practical applications

Important Dates
Submission deadline: January 15th, 2014 at 16:00 UTC
Acceptance notification: March 1st, 2014
Proceedings version: March 17th, 2014
Conference: May 28th, 2014

Conference Organizers

General chair
Mostapha Belkasmi
(ENSIAS, Rabat Universite Mohammed V Souissi Rabat, Morocco)

Program chairs
David Pointcheval
Damien Vergnaud
(ENS, Paris, France)

Instructions for Authors

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings.
Submissions will take place entirely via a web system.
All submissions will be blind reviewed. The paper must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of keywords.
The final proceedings version will be a paper of at most 18 pages in the llncs style. The document submitted (excluding appendices) should correspond to what the authors expect to be published if their paper is accepted without modification. We therefore strongly recommend that authors check whether their paper (without appendices) wills t within the above llncs space constraints. Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length.
Submissions not meeting these guidelines risk rejection without consideration of their merits.


The proceedings with revised selected papers will be published in Springer-Verlag's Lecture Notes in Computer Science, and will be available at the conference.
Clear instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers. Authors of accepted papers must guarantee that their paper will be presented at the conference.

Program Committee

Abdelhak Azhari- Hassan II University in Casablanca, Morocco
Hussain Benazza - Ensam-Meknes, Moulay Ismail University, Morocco
Dario Catalano - Universit a di Catania, Italy
Riaal Domingues - South African Communications and Security Agency, South Africa
Dario Fiore - Max Planck Institute for Software Systems, Saarbruecken, Germany
Pierre-Alain Fouque - University of Rennes I, France
Georg Fuchsbauer - IST Austria
Sanjam Garg - IBM Research, USA
Essam Ghada - University of Bristol, UK
Tetsu Iwata - Nagoya University, Japan
Seny Kamara - Microsoft Research, USA
Fabien Laguillaumie - University of Lyon I, France
Benoit Libert - Technicolor, France
Mark Manulis - University of Surrey, UK
Maria Naya-Plasencia - INRIA, France
Abderrahmane Nitaj - University of Caen, France
Kaisa Nyberg - Aalto University School of Science, Finland
Sami Omar - Tunis University, Tunisia
Ayoub Otmani - University of Rouen, France
Duong Hieu Phan - University of Paris 8, France
Vincent Rijmen - KU Leuven and iMinds, Belgium
Magdy Saeb - Arab Academy of Science, Technology and Maritime Transport, Alexandria, Egypt
Rei Safavi-Naini - University of Calgary, Canada
Palash Sarkar -Indian Statistical Institute, India
Peter Schwabe - Radboud University Nijmegen, The Netherlands
Francesco Sica - Nazarbayev University, Kazakhstan
Djiby Sow - University of Dakar, Senegal
Fran cois-Xavier Standaert - UCL, Belgium
Christine Swart - University of Cape Town, South Africa
Isamu Teranishi - NEC, Japan
Mehdi Tibouchi - NTT Secure Platform Laboratories, Japan
Ivan Visconti - Universit a di Salerno, Italy
Duncan Wong - City University of Hong Kong, China
Amr M. Youssef - Concordia University, Montreal, Quebec, Canada

Related Resources

ICML 2017   34th International Conference on Machine Learning
CMVIT-Ei 2017   2017 International Conference on Machine Vision and Information Technology (CMVIT 2017)
BCI for Neurorobotics 2017   Brain Computer Interface Systems for Neurorobotics: Methods and Applications
Petri Nets 2017   CFP 38th Int. Conf. on APPLICATIONS AND THEORY OF PETRI NETS AND CONCURRENCY (Petri nets 2017), Zaragoza, Spain, June 25-30, 2017
CGTA 2017   Conference on Geometry: Theory and Applications
IETCPS 2017   IET Cyber-Physical Systems: Theory & Applications, Special Issue on Safety-Critical Cyber Physical Systems
Petri Nets 2017   Applications and Theory of Petri Nets
CANS 2016   15th International Conference on Cryptology and Network Security
UbiComp 2017   2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing
ASIACRYPT 2016   The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security