5. AFRICACRYPT 2012: Ifrance, Morocco

Signature Schemes

Stream Ciphers

Applications of Information Theory

Block Ciphers

Network Security Protocols

Public-Key Cryptography

Cryptanalysis of Hash Functions

Hash Functions: Design and Implementation

Algorithms for Public-Key Cryptography

Cryptographic Protocols

Invited Talks

a service of Schloss Dagstuhl - Leibniz Center for Informatics