cataCRYPT 2015 - Workshop on Catastrophic Events Related to Cryptography and their Possible Solutions
Topics/Call fo Papers
The main point is: many cryptographic protocols are only based on the security of one cryptographic algorithm (e.g. RSA) and we don't know the exact RSA security (including Ron Rivest). What if somebody finds a clever and fast factoring algorithm? Well, it is indeed an hypothesis but we know several instances of possible progress. A new fast algorithm is a possible catastroph if not handled properly. And there are other problems with hash functions, elliptic curves, aso. Think also about the recent Heartbleed bug (April 2014, see http://en.wikipedia.org/wiki/Heartbleed): the discovery was very late and we were close to a catastrophic situation.
So we are thinking about a regular workshop, the name is cataCRYPT, about these possible problems and their solutions. It includes problems with cryptographic algorithms, protocols, PKI, DRM, TLS-SSL, smart cards, RSA dongles, MIFARE, aso. Quantum computing, resilience and agility are also on the program.
The workshop aims at bringing together researchers and practitioners working in cryptography and security, from academia and industry. A large committee including many founders of the main concepts of public-key cryptography is pushing this important topic.
Format
The workshop will consist of invited and keynote presentations, full papers, informal contributions, panels, research in progress and discussions.
So we are thinking about a regular workshop, the name is cataCRYPT, about these possible problems and their solutions. It includes problems with cryptographic algorithms, protocols, PKI, DRM, TLS-SSL, smart cards, RSA dongles, MIFARE, aso. Quantum computing, resilience and agility are also on the program.
The workshop aims at bringing together researchers and practitioners working in cryptography and security, from academia and industry. A large committee including many founders of the main concepts of public-key cryptography is pushing this important topic.
Format
The workshop will consist of invited and keynote presentations, full papers, informal contributions, panels, research in progress and discussions.
Other CFPs
- Second Workshop on Physical-layer Methods for Wireless Security
- First Workshop on Security and Privacy in the Cloud (SPC 2015)
- 1st Workshop on Security and Privacy in Cybermatics
- ACM DocEng Workshop on (Document) Changes: modeling, detection, storage and visualization
- First International Workshop on Online Social Networks Technologies
Last modified: 2015-05-24 07:24:27