Special topics

  • Algorithms for cryptography, cryptanalysis and their complexity analysis (2014)
  • Applications of coding theory and combinatorics in cryptography (2010)
  • Counter-measures against side channel attacks in symmetric cryptography (2023)
  • Cryptographic algorithms and protocols for ubiquitous computing (sensor networks, RFID) (2005)
  • Cryptographic solutions for Internet security and secure wireless/mobile networks (1998)
  • Cryptographic solutions for mobile (web) services (2004)
  • Cryptographic solutions for mobile and wireless network security. (2002)
  • Cryptographic solutions for web services security and cryptography and security of trusted and distributed systems (2003)
  • Cryptographic solutions for web/Internet security (1999, 2000, 2001)
  • Cryptographic tools and methods for securing clouds (2011)
  • Cryptographic tools for privacy, privacy-enhancing technologies and interactions between privacy and cryptography (2024)
  • Cryptography for the Internet of Things (2018)
  • Elliptic and hyperelliptic curve cryptography, including theory and applications of pairings (2008, 2013)
  • Innovative cryptographic defenses against malicious software (2007)
  • Light-weight authentication protocols (2012)
  • Machine learning and cryptography: applications of machine learning to cryptography and cryptanalysis, and application of cryptanalytic techniques against machine learning algorithms (2025)
  • Post-quantum cryptography (2017)
  • Privacy and anonymity enhancing technologies and their analysis (2015)
  • Privacy enhancing mechanisms and techniques (2021)
  • Privacy-enhancing cryptographic systems (2009)
  • Protocols and techniques for web security (1997)
  • Real-world cryptography/cryptographic protocols in practice (2019)
  • Secure elections and related cryptographic constructions (2020)
  • Side channel, fault and related attacks on symmetric and asymmetric cryptographic primitives and their countermeasures (2016)
  • Side-channel analysis (DPA, DFA, Cache analysis, etc.) (2006)
  • Theory and practice of isogeny-based cryptography (2022)