Golden gate bridge catacrypt logo

Workshop on catastrophic events related to cryptography and security with their possible solutions


Home

Committees
Call for contributions
Program (schedule)
 
Venue
Registration
Stipends

Documents and links

Contact


Sponsors (to be added)

NXP

data:image/jpeg;base64,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

Verisign
VRSN_logo_vertical_CMYK

Scope and call for contributions

A workshop about catastrophic events related to cryptography and security. And their prevention, detection, recovery, solutions ...

The main point is: many cryptographic protocols are only based on the security of one cryptographic algorithm (e.g. RSA) and  we don't know the exact RSA security (including Ron Rivest). What if somebody finds a  clever and fast factoring algorithm? Well, it is indeed an hypothesis but we know several  instances of possible progress. A new fast algorithm is a possible  catastroph if not handled  properly. And there are other problems with hash functions, elliptic curves, aso.

So we are thinking about a regular workshop, the name is CATACRYPT, about these possible problems and their solutions. It includes problems with cryptographic algorithms, protocols, PKI, DRM, smart cards, RSA dongles, MIFARE, aso. Quantum computing, resilience and agility are also on the program.

The workshop aims at bringing together researchers and practitioners working in cryptography and security, from academia and industry. A large committee including many founders of the main concepts of public-key cryptography is pushing this important topic.

Format

The workshop will consist of invited keynote presentations, full papers, informal contributed presentations, panels, rump session and discussions. There will be IEEE formal proceedings only for full papers.

Keynote Speakers: to be announced.

Important Key Dates for full paper submissions

All papers will be submitted via EDAS. The authors need to follow the formatting guidelines of CNS regular papers available on the main conference website
IEEE Conference on Communications and Network Security (CNS2014) http://cns2014.ieee-cns.org/content/submission-instructions-1

Full paper submission deadline June 1, 2014
Acceptance notifications July 1, 2014

Camera-ready version for full paper

July 14, 2014
Workshop date October 29, 2014

Organization

The workshop chair is Jean-Jacques Quisquater (UCLouvain).