Africacrypt 2016 will be no exception to other past Africacrypt conferences. It will seek excellent contributions to the field, and attract position keynotes.
In addition to providing an international forum for researchers and academics from all over the world for presenting and discussing recent advances in cryptology and its applications, Africacrypt 2016 ambitions to attract practionners from governemnt, industry and private sector interested in cryptology and its applications.
The 2016 edition of Africacrypt will feature keynote speakers from leading software editors and hardware manufacturers, as well as exposition booths.
The conference seeks original contributions in any area of cryptology or related fields. We welcome submissions about, but not limited to:
The proceedings with revised selected papers will be published in Springer-Verlag’s Lecture Notes in Computer Science (see Instructions for authors below). Authors of accepted papers must guarantee that their paper will be presented at the conference.
In addition to the 25-minute presentations of the accepted papers that will be published in the proceedings, a poster session will be organized. When submitting a paper, please indicate if you want it to be considered for this poster session if not accepted for publication.
After the conference, authors of selected outstanding papers will be invited to submit extended versions of their papers for consideration of publication in International Journal of Applied Cryptography (IJACT)
|Abstract Submission deadline||December 14th, 2015 at 16:00 UTC|
|Paper Submission deadline||December 17th, 2015 at 16:00 UTC|
|Paper Acceptance notification||January 23th, 2016|
|Camera-ready version||February 3rd, 2016|
|Poster Submission deadline||March 14th, 2016|
|Poster Acceptance notification||March 30th, 2016|
|Conference||April 13-15, 2016|
|General chair||Tajjeeddine Rachidi (Alakhawayn University in Ifrane)|
|Program chair||David Pointcheval (ENS Paris, France)|
|Co-program chair||Abderrahmane Nitaj (Caen Univ., France)|
Submissions must be in English, and must not be substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or other conference or workshop that has proceedings.
Submissions will take place entirely via a web system available from The Ecole Normal Supérieure and accessible through the Submission link.
All submissions will be blind reviewed. The paper must be anonymous, with no author names, affiliations, acknowledgements, or obvious references. It should begin with a title, a short abstract, and a list of keywords.
The final proceedings version will be a paper of at most 20 pages in the llncs style, and clear instructions will be sent to the authors of accepted papers. Thus, the document submitted (excluding clear marked appendices) should correspond to what the authors expect to be published if their paper is accepted without modification. We therefore strongly recommend that authors check whether their paper (without appendices) will fit within the above LNCS space constraints (see guidelines for paper preparation and Latex and Microsoft Word 7 templates).
Committee members are not required to review more than that, so the paper should be intelligible and self-contained within this length. Submissions not meeting these guidelines risk rejection without consideration of their merits.
On the front page of your paper submission, please indicate if your submission is also a candidate for the poster session in case it is not selected as a published paper.
For additional poster submissions, please send a 2-page description of the work to the program chairs: africacrypt2016ATdi.ens.fr
Posters can present ongoing work or already published results.
|Muhammad Rezal Kamel Ariffin|
|Sherman S.M. Chow|
|Jesper Buus Nielsen|
|Duong Hieu Phan|
|Amr M. Youssef|