ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

MoCrySEN 2013 - 2nd International Workshop on Modern Cryptography and Security Engineering (MoCrySEN 2013)

Date2013-09-03

Deadline2013-03-30

VenueRegensburg, Germany Germany

Keywords

Websitehttps://www.ares-conference.eu

Topics/Call fo Papers

International Workshop on Modern Cryptography and Security Engineering (co-located with the International Conference on Availability, Reliability and Security) aims to bring together researchers working in theoretical aspects of modern cryptography (including but not restricted to design and analysis of symmetric-key primitives and cryptosystems, block and stream ciphers, hash functions and MAC algorithms, efficient implementations and analysis of code-based cryptosystems, threshold schemes) with professionals working on applied aspects of security engineering, particularly people involved in standardization and in industrial deployment of cryptography (encryption schemes for databases and related security, cryptography in wireless applications, hardware for cryptanalysis, FPGA and smart cards security). The main goal of the workshop is to strengthen the dialogue between these two groups, which is currently perceived to be weak. Ultimately, we aim to make a start on bridging the gap between what academic cryptographers believe should be the goals of cryptographic design and what is actually implemented in the real world. MoCrySEn intends to provide a better understanding of real-world cryptographic issues to the theoretical community, helping to inform their research and set new research challenges for the theoretical community and enable practitioners to develop a clearer view of the current state-of-the-art in cryptographic research and what it offers to practitioners.
Topics of interest comprise but are not limited to:
Symmetric cryptography
Code-based cryptosystems
Secret-sharing cryptography
Algorithmic cryptanalysis
Database encryption
Hardware security
Data privacy in practice
Interactions between cryptographic theory and implementation issues

Last modified: 2013-01-20 17:31:09