You are on page 1of 7

WEWoRC

WEWoRC Western European Workshop on Western European


Workshop on
Research in Cryptology, July 4-6 2006 Research in
Cryptology

WEWoRC is
I a research meeting in the field of cryptology
I with a specific focus on young researchers
WEWoRC
WEWoRC Western European Workshop on Western European
Workshop on
Research in Cryptology, July 4-6 2006 Research in
Cryptology

WEWoRC is
I a research meeting in the field of cryptology
I with a specific focus on young researchers

How we work:
1. submit an abstract (short or long) deadline: May 27
and register for the workshop
WEWoRC
WEWoRC Western European Workshop on Western European
Workshop on
Research in Cryptology, July 4-6 2006 Research in
Cryptology

WEWoRC is
I a research meeting in the field of cryptology
I with a specific focus on young researchers

How we work:
1. submit an abstract (short or long) deadline: May 27
and register for the workshop
2. give a presentation at WEWoRC July 4-6
WEWoRC
WEWoRC Western European Workshop on Western European
Workshop on
Research in Cryptology, July 4-6 2006 Research in
Cryptology

WEWoRC is
I a research meeting in the field of cryptology
I with a specific focus on young researchers

How we work:
1. submit an abstract (short or long) deadline: May 27
and register for the workshop
2. give a presentation at WEWoRC July 4-6
3. submit a full paper
for the reviewed postproceedings Sept. 3
(by invitation only)
WEWoRC
More information: http://2007.weworc.org/ Western European
Workshop on
Research in
Cryptology
WEWoRC
More information: http://2007.weworc.org/ Western European
Workshop on
Research in
Cryptology
Invited Speakers are
I George Danezis
(Katholieke Universiteit Leuven, Belgium),
I David Naccache (ENS Paris, France).
WEWoRC
More information: http://2007.weworc.org/ Western European
Workshop on
Research in
Cryptology
Topics of interest include, but are not limited to
I foundations of cryptology (e.g., from computational
number theory, complexity theory, combinatorics),
I secret-key cryptosystems and hash functions,
I public-key cryptosystems,
I modes of operation (e.g., Authenticated encryption and
signcryption),
I cryptographic protocols (e.g., privacy, mobile security,
distributed cryptography),
I implementation of cryptosystems and their integration
into secure systems,
I secure operating systems and trusted computing,
I applications such as watermarking and code
obfuscation.

You might also like