Topics in Cryptology CT-RSA 2011

Author: Aggelos Kiayias

Published in: Springer

ISBN: 978-3-642-19074-2

File Type: pdf

File Size:  4 MB

Language: English



Description

The RSA conference was initiated in 1991 and is a major international event for cryptography or Cryptology and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included the Cryptographers’ Track (called the CT-RSA), which enables the forefront of cryptographic or Cryptology research to be presented within the formal program of the conference. CT-RSA has become a major publication venue for cryptographers worldwide. This year the RSA conference was held in San Francisco, California, during February 14–18, 2011. The CT-RSA conference servers were running in the University of Athens, Greece, and we received 82 submissions out of which 3 were withdrawn. Every paper was reviewed by at least three committee members. The Program Committee members were also allowed to submit up to one paper for inclusion in the program. Such papers were reviewed by at least five committee members. The reviewing of the submissions proceeded in two stages: in the first stage papers were read individually by committee members without knowledge of other committee members’ opinions. In the second stage, all reviews were made available to committee members and discussion through a Web bulletin board ensued. After a total of seven weeks the committee work concluded and a selection of 24 papers was made for inclusion in the conference program.In a small number of cases a final round of reviewing took place as some of the papers were accepted conditionally on specific changes that were requested by the Program Committee. The final revised versions of the accepted papers is what you will find in this volume.

We were very pleased this year to have three keynote talks included in the CT- RSA program. Dan Boneh from Stanford University gave a talk on computing with signed data. Dickie George of the Information Assurance Directorate at NSA spoke on NSA’s role in the development of DES. Adi Shamir from the Weizmann Institute of Science gave a talk on the role of academia and industry in the design and analysis of DES. The talk also featured a mini-talk by Martin Hellman on that subject. A number of people played key roles in the success of the conference this year. First and foremost I would like to thank the authors of all submitted papers; without their contributions the conference would not have been possible. Second, a special thanks is due to the members of the Program Committee and the subreviewers that invested a lot of their time in carefully reading the submitted papers and contributing to the discussion of each paper. The submission and review process was supported by the Web submission software written by Shai Halevi. I would also like to thank Bree LaBollita and Amy Szymanski, who worked very hard to properly organize the conference this year.
Similar Books

0 comments: