NTC 2016 - The 2nd Conference on Number Theory and Cryptography (NTC 2016)
Date2016-01-14 - 2016-01-16
Deadline2015-12-10
VenueBangkok, Thailand
KeywordsNumber Theory; Cryptography
Topics/Call fo Papers
Topics:
Number Theory
Elementary Number Theory
Algebraic Number Theory
Analytic Number Theory
Geometry of Numbers
Algebraic Geometry
Finite Fields and Their Applications
Cryptology
Algebraic Curves in Cryptography
Pairing Based Cryptography
Public Key Cryptography
Block Ciphers
Boolean Functions
Hash Functions
Quantum Cryptography
Stream Ciphers
Cryptanalysis
Cryptographic Hardware and Embedded Systems
Cryptographic Protocols
Information Security
Biometrics
Data Protection
Economics of Security and Privacy
Electronic Frauds
Embedded Security
Formal Methods in Security
Identity Management
Information Hiding and Watermarking
Network Security
Secure Group Communications
Security of E-Commerce, E-Business and E-Government
Security in Social Networks
Public Key Infrastructure
Authentication
E-Commerce/E-Government
Group Signatures
ID-based Schemes
Identity Management and e-ID
Implementations
Key Management
Mobile PKI
Multi-signatures
Policies & Regulations
Privacy
Protocols
Risk/Attacks
Standards
Timestamping
Trust Management
Trusted Computing
Web Services Security
Coding Theory
Number Theory
Elementary Number Theory
Algebraic Number Theory
Analytic Number Theory
Geometry of Numbers
Algebraic Geometry
Finite Fields and Their Applications
Cryptology
Algebraic Curves in Cryptography
Pairing Based Cryptography
Public Key Cryptography
Block Ciphers
Boolean Functions
Hash Functions
Quantum Cryptography
Stream Ciphers
Cryptanalysis
Cryptographic Hardware and Embedded Systems
Cryptographic Protocols
Information Security
Biometrics
Data Protection
Economics of Security and Privacy
Electronic Frauds
Embedded Security
Formal Methods in Security
Identity Management
Information Hiding and Watermarking
Network Security
Secure Group Communications
Security of E-Commerce, E-Business and E-Government
Security in Social Networks
Public Key Infrastructure
Authentication
E-Commerce/E-Government
Group Signatures
ID-based Schemes
Identity Management and e-ID
Implementations
Key Management
Mobile PKI
Multi-signatures
Policies & Regulations
Privacy
Protocols
Risk/Attacks
Standards
Timestamping
Trust Management
Trusted Computing
Web Services Security
Coding Theory
Other CFPs
- 3rd European Conference on Social Media ECSM 2016
- 2015 International Conference on Medical, Food and Biological Research (Cellular and Molecular Approach)
- 5th Aircraft Structural Design Conference
- 12th International Conference on integrated Formal Methods
- First EAI International Conference on Systems and Technology for Energy Management in Communication Networks
Last modified: 2015-07-22 18:03:45