10th International Conference on Cryptology in India
Indocrypt 2009
December 13 - 16, 2009, New Delhi, India
Submission deadline: August 14, 2009
Authors notification: September 28, 2009
Final version: October 2, 2009
Conference: December 13-16, 2009
The conference seeks original contributions in any area of cryptology or related fields.

Instructions to authors.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any other conference or workshop with formally published proceedings. Accepted submissions may not appear in any other conference or workshop with proceedings. The submission must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. Submissions not meeting these guidelines risk rejection without consideration of their merits.
The paper should be at most 12 pages excluding the bibliography and appendices, and at most 20 pages total using at least 11-point font and reasonable margins. The authors are encouraged to prepare their submission in Latex following Springer's guideline.
Authors of accepted papers must guarantee that their paper will be presented at the conference. One registration is compulsory against each accepted paper.

Topics.

The topics are as follows but are not limited to
  • Cryptography and Security
  • Key management protocols
  • Block/Stream ciphers
  • Watermarking and fingerprinting
  • Quantum cryptography
  • Hash functions
  • Number theory
  • Electronic commerce and payment
  • Elliptic curve Cryptography
  • Secret key cryptography
  • Public key cryptography
  • Anonymity
  • Digital signature schemes
  • Message authentication codes
  • Public-key cryptanalysis
  • Symmetric-key cryptanalysis
  • Group communication
  • Information theory and Security
  • Secret sharing
  • Cryptanalysis
  • Threshold cryptography
  • Design and Implementation
  • Broadcast encryption
  • Applications of cryptography
Last modification December 18, 2009