AFRICACRYPT 2009 : Second African International Conference on Cryptology
Conference Series : International Conference on Cryptology in Africa
Call For Papers
June 21-25, 2009, Gammarth, Tunisia
Submission: January 6, 2009
Poster Submission: February 2, 2009
Notification (for papers and posters): March 5, 2009
Final Version: March 30, 2009
Original papers on all technical aspects of cryptology are solicited for submission to Africacrypt 2009. The conference is organized by the Tunisian National Digital Certification Agency in cooperation with IACR. For more information see http://www.africacrypt2009.tn/.
The conference seeks original contributions in any area of cryptology or related fields. We welcome submissions about new cryptographic primitive proposals, cryptanalysis, security models, hardware
and software implementation aspects, cryptographic protocols and applications. We also consider submissions about cryptographic aspects of network security, complexity theory, information theory, coding theory, number theory, and quantum computing.
Instructions for Authors of Papers
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Accepted submissions may not appear in any other conference or workshop with proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Since the final version of accepted papers will have to follow the LNCS guidelines (see http://www.springeronline.com/lncs) with a total page limit of 18 pages including references and appendices, it is mandatory to submit in the same format. Up to 12 pages of additional supporting information may be provided, but committee members will read this information at their discretion, so the paper should be intelligible and self-contained within the 18 page LNCS limit.
Papers must be submitted electronically. A detailed description of the electronic submission procedure will be made available at the conference website. Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered.
Authors of accepted papers must guarantee that their paper will be presented at the conference.
It is the intention that accepted papers will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.
Instructions for Authors of Posters
In addition to the mainstream session, Africacrypt 2009 will have a poster session.
Authors who want to present a poster are encouraged to send an anonymous article of 4 to 10 pages in
LNCS format (and without supporting information). This limit will be strictly enforced. A printout of abstracts of the posters will be made available to the conference participants. Authors of accepted abstracts for the poster session must guarantee that they will have a poster presenting the technical content of their abstract available for presentation at the conference poster session. Posters will not appear in the LNCS proceedings.
Michel Abdalla, ENS, Paris, France
Paulo Barreto, University of Sao Paulo (USP), Brazil
Tom Berson, Anagram, USA
Anne Canteaut, INRIA Paris-Rocquencourt, France
Dario Catalano, University of Catania, Italy
Herve Chabanne, SAGEM, France
Jean-Marc Couveignes, Université Toulouse 2, France
Kris Gaj, George Mason University, USA
Henri Gilbert, Orange Labs, France
Helena Handschuh, Spansion, France
Martin Hirt, ETH Zurich, Switzerland
Seokhie Hong, Korea University, Korea
Tetsu Iwata, Nagoya University, Japan
Yassine Lakhnech, University Joseph Fourier-Grenoble, France
Tanja Lange, T.U.Eindhoven, The Netherlands
Yiqun Lisa Lin, USA
Helger Lipmaa, Cybernetica AS, Estonia
Keith Martin, Royal Holloway University of London, UK
Mitsuru Matsui, Mitsubishi Electric, Japan
Sihem Mesnager, University of Paris 8, France
Kaisa Nyberg, Helsinki University of Technology and Nokia, Finland
Sami Omar, University of Tunis, Tunisia
Elisabeth Oswald, University of Bristol, UK
Bart Preneel (chair), K.U.Leuven, Belgium
Alexander May, R.U.Bochum, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kazue Sako, NEC, Japan
Ali Aydin Selcuk, Bilkent University, Turkey
Christine Swart, University of Cape Town, South Africa
Serge Vaudenay, EPFL, Switzerland
Frederik Vercauteren, K.U.Leuven, Belgium
Michael Wiener, Cryptographic Clarity, Canada
Conference chairs :
Katholieke Universiteit Leuven
Dept. Electrical Engineering-ESAT/COSIC
Kasteelpark Arenberg 10 Bus 2446,
Tunisian National Digital Certification Agency
Parc Technologique El Ghazala,
Route de Raoued Km 3,5 - 2083 Ariana,
University of Tunis
ESSTT, Department of Mathematics,