NTC 2015 - 2015 Conference on Number Theory and Cryptography (NTC2015)
Date2015-01-29 - 2015-01-31
Deadline2014-12-10
VenueShanghai, China
KeywordsNumber Theory; Cryptography
Topics/Call fo Papers
Number Theory
Elementary number theory
Algebraic number theory
Analytic number theory
Geometry of numbers
Algebraic geometry
Finite Fields and their Applications
Cryptology
Algebraic Curves in Cryptography
Pairing Based Cryptography
Public Key Cryptography
Block Ciphers
Boolean Functions
Hash Functions
Quantum Cryptography
Stream Ciphers
Cryptanalysis
Cryptographic Hardware and Embedded Systems
Cryptographic Protocols
Information Security
Biometrics
Data Protection
Economics of Security and Privacy
Electronic Frauds
Embedded Security
Formal Methods in Security
Identity Management
Information Hiding and Watermarking
Network Security
Secure Group Communications
Security of eCommerce, eBusiness and eGovernment
Security in Social Networks
Public Key Infrastructure
Authentication
E-Commerce/e-Government
Group Signatures
ID-based Schemes
Identity Management and e-ID
Implementations
Key Management
Mobile PKI
Multi-signatures
Policies & Regulations
Privacy
Protocols
Risk/Attacks
Standards
Timestamping
Trust management
Trusted Computing
Web Services Security
Coding Theory
Elementary number theory
Algebraic number theory
Analytic number theory
Geometry of numbers
Algebraic geometry
Finite Fields and their Applications
Cryptology
Algebraic Curves in Cryptography
Pairing Based Cryptography
Public Key Cryptography
Block Ciphers
Boolean Functions
Hash Functions
Quantum Cryptography
Stream Ciphers
Cryptanalysis
Cryptographic Hardware and Embedded Systems
Cryptographic Protocols
Information Security
Biometrics
Data Protection
Economics of Security and Privacy
Electronic Frauds
Embedded Security
Formal Methods in Security
Identity Management
Information Hiding and Watermarking
Network Security
Secure Group Communications
Security of eCommerce, eBusiness and eGovernment
Security in Social Networks
Public Key Infrastructure
Authentication
E-Commerce/e-Government
Group Signatures
ID-based Schemes
Identity Management and e-ID
Implementations
Key Management
Mobile PKI
Multi-signatures
Policies & Regulations
Privacy
Protocols
Risk/Attacks
Standards
Timestamping
Trust management
Trusted Computing
Web Services Security
Coding Theory
Other CFPs
- 2015 4th International Conference on Electronics, Mechatronics and Automation (ICEMA 2015)
- 2015 4th International Conference on Advancements in Information Technology (ICAIT 2015)
- 2015 2nd International Conference on Substantial Environmental Technologies (ICSET 2015)
- 2015 2nd International Conference on Software Engineering (ICOSE 2015)
- 2015 2nd International Conference on Mechatronics, Electronics and Automation Engineering (ICMEAE 2015)
Last modified: 2014-11-10 15:09:53