2. AFRICACRYPT 2009: Gammarth, Tunisia

Hash Functions

Block Ciphers

Asymmetric Encryption

Digital Signatures

Asymmetric Encryption and Anonymity

Key Agreement Protocols

Cryptographic Protocols

Efficient Implementations

Implementation Attacks