posted by system || 1448 views

AFRICACRYPT 2009 : Second African International Conference on Cryptology


Conference Series : International Conference on Cryptology in Africa
When Jun 21, 2009 - Jun 25, 2009
Where Gammarth (Tunis), Tunisia
Submission Deadline Jan 6, 2009
Notification Due Mar 5, 2009
Final Version Due Mar 30, 2009

Call For Papers

June 21-25, 2009, Gammarth, Tunisia

Submission: January 6, 2009
Poster Submission: February 2, 2009
Notification (for papers and posters): March 5, 2009
Final Version: March 30, 2009

General Information

Original papers on all technical aspects of cryptology are solicited for submission to Africacrypt 2009. The conference is organized by the Tunisian National Digital Certification Agency in cooperation with IACR. For more information see
The conference seeks original contributions in any area of cryptology or related fields. We welcome submissions about new cryptographic primitive proposals, cryptanalysis, security models, hardware
and software implementation aspects, cryptographic protocols and applications. We also consider submissions about cryptographic aspects of network security, complexity theory, information theory, coding theory, number theory, and quantum computing.

Instructions for Authors of Papers

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose. Accepted submissions may not appear in any other conference or workshop with proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Since the final version of accepted papers will have to follow the LNCS guidelines (see with a total page limit of 18 pages including references and appendices, it is mandatory to submit in the same format. Up to 12 pages of additional supporting information may be provided, but committee members will read this information at their discretion, so the paper should be intelligible and self-contained within the 18 page LNCS limit.

Papers must be submitted electronically. A detailed description of the electronic submission procedure will be made available at the conference website. Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered.
Authors of accepted papers must guarantee that their paper will be presented at the conference.

It is the intention that accepted papers will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.

Instructions for Authors of Posters

In addition to the mainstream session, Africacrypt 2009 will have a poster session.
Authors who want to present a poster are encouraged to send an anonymous article of 4 to 10 pages in
LNCS format (and without supporting information). This limit will be strictly enforced. A printout of abstracts of the posters will be made available to the conference participants. Authors of accepted abstracts for the poster session must guarantee that they will have a poster presenting the technical content of their abstract available for presentation at the conference poster session. Posters will not appear in the LNCS proceedings.

Program Committee

Michel Abdalla, ENS, Paris, France
Paulo Barreto, University of Sao Paulo (USP), Brazil
Tom Berson, Anagram, USA
Anne Canteaut, INRIA Paris-Rocquencourt, France
Dario Catalano, University of Catania, Italy
Herve Chabanne, SAGEM, France
Jean-Marc Couveignes, Université Toulouse 2, France
Kris Gaj, George Mason University, USA
Henri Gilbert, Orange Labs, France
Helena Handschuh, Spansion, France
Martin Hirt, ETH Zurich, Switzerland
Seokhie Hong, Korea University, Korea
Tetsu Iwata, Nagoya University, Japan
Yassine Lakhnech, University Joseph Fourier-Grenoble, France
Tanja Lange, T.U.Eindhoven, The Netherlands
Yiqun Lisa Lin, USA
Helger Lipmaa, Cybernetica AS, Estonia
Keith Martin, Royal Holloway University of London, UK
Mitsuru Matsui, Mitsubishi Electric, Japan
Sihem Mesnager, University of Paris 8, France
Kaisa Nyberg, Helsinki University of Technology and Nokia, Finland
Sami Omar, University of Tunis, Tunisia
Elisabeth Oswald, University of Bristol, UK
Bart Preneel (chair), K.U.Leuven, Belgium
Alexander May, R.U.Bochum, Germany
Rei Safavi-Naini, University of Calgary, Canada
Kazue Sako, NEC, Japan
Ali Aydin Selcuk, Bilkent University, Turkey
Christine Swart, University of Cape Town, South Africa
Serge Vaudenay, EPFL, Switzerland
Frederik Vercauteren, K.U.Leuven, Belgium
Michael Wiener, Cryptographic Clarity, Canada

Conference chairs :

Program Chair:
Bart Preneel
Katholieke Universiteit Leuven
Dept. Electrical Engineering-ESAT/COSIC
Kasteelpark Arenberg 10 Bus 2446,
B-3001 Leuven,
Email: firstname.lastname(AT)

General chair:
Sami Ghazali
Tunisian National Digital Certification Agency
Parc Technologique El Ghazala,
Route de Raoued Km 3,5 - 2083 Ariana,
Email: firstname.lastname(AT)

Sami Omar
University of Tunis
ESSTT, Department of Mathematics,
Email: firstname.lastname(AT)

Related Resources

ICoSIS 2017   International EAI Conference on Smart and Innovative Systems
NAAAS 2017   National Association of African American Studies 25th Anniversary Conference
PACIM 2017   Pan African Congress of Integrative Medicine (PACIM)
AICCVA 2017   African Interdisciplinary Conference on Contemporary Violence in Africa
ADAM 2017   African Days on Applied Mathematics