Africacrypt 2009, South Africa, May 03-06 Pictures from South Africa

AFRICACRYPT 2010, Call for Papers

The conference seeks original contributions in cryptology: We welcome submissions about new cryptographic primitive proposals, cryptanalysis, security models, hardware and software implementation aspects, cryptographic protocols and applications. We also consider submissions about cryptographic aspects of network security, complexity theory, information theory, coding theory, number theory, and quantum computing.
The proceedings of Africacrypt 2010 will be published by Springer Verlag in the Lecture Notes in Computer Science (LNCS) series. The proceedings will be available during the conference.

Important deadlines and dates

January 05, 2010: Registration of paper (title, abstract)
January 10, 2010: Submission deadline
February 19, 2010: Notification of acceptance or rejection
February 28, 2010: Revised version of accepted papers due
May 03-06, 2010: Africacrypt 2010

Instructions for Authors of Papers

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Information about submissions may be shared with program chairs of other conferences for the purpose of detecting duplication. Accepted submissions may not appear in any other conference or workshop with proceedings.

Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Each submission should begin with a title, a short abstract, and a list of keywords, and an introduction that summarizes the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits.

The page limit for submissions is 18 pages in LNCS format (see including references and appendices. Up to 12 pages of additional supporting information may be provided, but committee members will read this information at their discretion, so the paper should be intelligible and self-contained within the 18 page LNCS limit. The final versions of accepted papers will be limited to 18 pages including references and appendices.

Papers must be submitted electronically. A detailed description of the electronic submission procedure is available at

Submissions must conform to this procedure. Late submissions and non-electronic submissions will not be considered. No new submissions will be accepted after the submission of abstracts deadline (Jan 05); it is still possible to modify the submissions until Jan 10. Authors of accepted papers must guarantee that their paper will be presented at the conference.

Accepted papers will be published in Springer-Verlag's Lecture Notes in Computer Science and will be available at the conference. Instructions about the preparation of a final proceedings version will be sent to the authors of accepted papers.

Program Committee

Michel Abdalla, Ecole Normale Superieure, France
Roberto Avanzi, Ruhr-University Bochum, Germany
Hatem M. Bahig, Ain Shams University, Egypt
Paulo S. L. M. Barreto, University of São Paulo, Brazil
Lejla Batina, Radboud University Nijmegen and KU Leuven, Netherlands and Belgium
Daniel J. Bernstein, University of Illinois at Chicago, USA
Ashraf M. Bhery, Ain Shams University, Egypt
Peter Birkner, Université de Versailles Saint-Quentin-en-Yvelines, France
Colin Boyd, Queensland University of Technology, Australia
Xavier Boyen, University of Liege, Belgium
Johannes Buchmann, TU Darmstadt, Germany
Christophe De Cannière, Katholieke Universiteit Leuven, Belgium
Chen-Mou Cheng, National Taiwan University, Taiwan
Carlos Cid, Royal Holloway, University of London, UK
Alexander W. Dent, Royal Holloway, University of London, UK
Yvo Desmedt, University College London, UK and RCIS, AIST, Japan
Christophe Doche, Macquarie University, Australia
Orr Dunkelman, Weizmann Institute, Israel
Matthieu Finiasz, ENSTA, France
Shay Gueron, University of Haifa and Intel Corporation, Israel
Tim Güneysu, Ruhr-University Bochum, Germany
Helena Handschuh, Katholieke Universiteit Leuven, Belgium and Intrinsic-ID, USA
Antoine Joux, DGA and University of Versailles Saint-Quentin-en-Yvelines, France
Marc Joye, Technicolor, France
Tanja Lange, Technische Universiteit Eindhoven, Netherlands
Keith Martin, Royal Holloway, University of London, UK
Mitsuru Matsui, Mitsubishi Electric, Japan
David McGrew, Cisco, USA
Alfred Menezes, University of Waterloo, Canada
Michele Mosca, University of Waterloo, Canada
Michael Naehrig, Microsoft Research, USA
Abderrahmane Nitaj, Université de Caen, France
Elisabeth Oswald, University of Bristol, UK
Christof Paar, Ruhr-University Bochum, Germany
Daniel Page, University of Bristol, UK
Josef Pieprzyk, Macquarie University, Australia
Bart Preneel, Katholieke Universiteit Leuven, Belgium
Christian Rechberger, Katholieke Universiteit Leuven, Belgium
Magdy Saeb, Arab Academy for Science, Technology & Maritime Transport, Egypt
Palash Sarkar, Indian Statistical Institute, India
Berry Schoenmakers, Technische Universiteit Eindhoven, Netherlands
Michael Scott, Dublin City University, Ireland
Nicolas Sendrier, INRIA, France
Francesco Sica, University of Calgary, Canada
Martijn Stam, EPFL, Switzerland
François-Xavier Standaert, Universite catholique de Louvain, Belgium
Damien Stehlé, CNRS/University of Sydney/Macquarie University, France/Australia/Australia
Christine Swart, University of Cape Town, South Africa
Mike Szydlo, Akamai, USA
Brent Waters, University of Texas at Austin, USA
Michael J. Wiener, Cryptographic Clarity, Canada
Bo-Yin Yang, Academia Sinica, Taiwan
Amr M. Youssef, Concordia University, Canada
Paul Zimmermann, INRIA Nancy - Grand Est, France

Conference chairs:

Program Chairs:

Daniel J. Bernstein
University of Illinois at Chicago

Tanja Lange
Technische Universiteit Eindhoven

General chairs:

Riaal Domingues
South African Communications and Security Agency
South Africa

Dr. Christine Swart
University of Cape Town
South Africa