LWCrypt 2012 - International Workshop on Lightweight Cryptography (LWCrypt)
Topics/Call fo Papers
Smart devices such as RFID tags, smart card and wireless sensor nodes are penetrating into our daily life at a staggering rate. Their applications range from access control, and inventory stock to home automation and hospital patient safety. The success of these new technologies is conditioned on the use of secure (i.e. privacy protection, unlinkability of tags' holder, etc.) and efficient solutions (i.e. small footprint and/or low-power consumption). Due to the limited resources (i.e. computing capabilities, memory, power consumption, etc.) of these devices, new cryptographic solutions are demanded. Alternatively, efficient implementations of standard cryptographic solutions can be used.
The aim of LWCrypt is to provide an international forum on resource-constrained devices and lightweight cryptography, in which the new trends and lightweight cryptographic solutions are publicized and discussed. Submissions and interactions from academia, government, and industry are welcome and appreciated.
The conference seeks original contributions in the area of resource-constrained devices, lightweight cryptography and related fields. We welcome submissions about, but not limited to:
Authentication protocols
Cryptographic primitives
Public-key cryptography
Key updating mechanisms
Cryptanalysis
Security proofs
Formal models
Anonymity
Privacy and security
Scalability issues
Efficient implementations
The aim of LWCrypt is to provide an international forum on resource-constrained devices and lightweight cryptography, in which the new trends and lightweight cryptographic solutions are publicized and discussed. Submissions and interactions from academia, government, and industry are welcome and appreciated.
The conference seeks original contributions in the area of resource-constrained devices, lightweight cryptography and related fields. We welcome submissions about, but not limited to:
Authentication protocols
Cryptographic primitives
Public-key cryptography
Key updating mechanisms
Cryptanalysis
Security proofs
Formal models
Anonymity
Privacy and security
Scalability issues
Efficient implementations
Other CFPs
- International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI)
- International Workshop on Security Aspects of Process-aware Information Systems (SAPAIS)
- TARS 2011 Aquaculture Feeds and Nutrition
- International Workshop on Secure systems methodologies using patterns (SPattern)
- International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD)
Last modified: 2011-11-16 20:32:09