START Conference Manager    

ASIACRYPT 2005

ASIACRYPT 2005

Electronic Submission Page

Deadline: 30th May, 2005


To revise a previous submission, please type in its passcode below, and press the ENTER button.

   

If you lost the passcode for your submission, please click HERE.


Use the fields below to make your submission. Follow the instructions, and then use the 'Submit' button at the bottom of the form.

Important: ASIACRYPT 2005 is running a blind review process. In preparing your manuscript, do not include any information which could reveal your identity, or that of your co-authors. The title section of your manuscript should not contain any author names, email addresses, or affiliation status. If you do include any author names on the title page, your submission will be automatically rejected. In the body of your submission, you should eliminate all direct references to your own previous work. That is, avoid phrases such as "this contribution generalizes our results for XYZ". Also, please do not disproportionately cite your own previous work. In other words, make your submission as anonymous as possible. We need your cooperation in our effort to maintain a fair, blind reviewing process - and to consider all submissions equally.


Title of Submission:
Authors:


Contact Information:

Title 
First name*
Last name*
  Affiliation/organization*
       Affiliation Dept/Lab 
Phone*
Fax 
Email*
URL 
Address 
Town*
State/Province 
Country*
Zip/Postal Code*


Submit Manuscript:

Find the file containing your submission:

File:  


Summary:

Type (or cut-and-paste) a short ASCII summary for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 300 words.


Keywords/Topics:

Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

foundations
new constructions
new applications
algorithms and implementation
symmetric-key cryptanalysis
symmetric-key encryption
message authentication codes
cipher design and analysis
block ciphers
stream ciphers
modes of operation
pseudorandomness
public-key cryptanalysis
public-key encryption
identity-based encryption
signatures
group signatures
hash functions
protocols
committment schemes
key management
password based authentication
distributed cryptography
secret sharing
two-party computation
multi-party computation
universal composability
zero knowledge
anonymity
private computation
unconditional security
number theory
elliptic curves
bilinear maps
digital rights management
traitor tracing
broadcast encryption
quantum cryptography
other


START Conference Manager (V2.61.0 - Rev. 6236M)