2. AFRICACRYPT 2009: Gammarth, Tunisia

Hash Functions

Block Ciphers

Asymmetric Encryption

Digital Signatures

Asymmetric Encryption and Anonymity

Key Agreement Protocols

Cryptographic Protocols

Efficient Implementations

Implementation Attacks

maintained by Schloss Dagstuhl LZI at University of Trier