INDOCRYPT 2013: Mumbai, India

Provable Security

Hash Functions and Signatures

Side Channel Attacks I

Symmetric Key Cryptanalysis I

Key Exchange and Secret Sharing

Side Channel Attacks II

Efficient Implementation and Hardware

Coding Theory in Cryptography

Symmetric Key Cryptanalysis II

maintained by Schloss Dagstuhl LZI at University of Trier