Description: C:\Users\00336\Desktop\ProvSec2013 webpage 3.0\image\banner.jpg

 

Sponsored By:

Description: C:\Users\00336\Desktop\ProvSec2013 webpage 3.0\image\SKMM-MCMC-a.jpg

Description: C:\Users\00336\Desktop\ProvSec2013 webpage 3.0\image\logo_prestariang.png

Description: C:\Users\00336\Desktop\ProvSec2013 webpage 3.0\image\tm_logo.jpg

Description: C:\Users\00336\Desktop\ProvSec2013 webpage 3.0\image\download.jpg

Description: C:\Users\00336\Desktop\ProvSec2013 webpage 3.0\image\LNCSlogo.jpg

 

HOME

The Seventh International Conference on Provable Security (ProvSec 2013) was held in Melaka, Malaysia on 23-25 October 2013. It was organized by Universiti Teknikal Malaysia Melaka.

Provable security is an important research area in modern cryptography. Cryptographic primitives or protocols without a rigorous proof cannot be regarded as secure even in practice. In fact, there are many schemes that were originally thought as secure but eventually broken, which clearly indicates the need of formal security assurance. With provable security, we are confident in using cryptographic schemes and protocols in various real-world applications. Meanwhile, schemes with provable security sometimes give only theoretical feasibility rather than a practical construction, and correctness of the proofs may be difficult to verify. ProvSec conference thus provides a platform for researchers, scholars and practitioners to exchange new ideas for solving these problems in the provable security area.

The previous ProvSec conference series were successfully held in Wollongong, Australia (2007), Shanghai, China (2008), Guangzhou, China (2009), Malacca, Malaysia (2010), Xi’an, China (2011), and Chengdu, China (2012). The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series.

Conference Topics
: Topics include all aspects of provable security for cryptographic primitives or protocols, and include but are not limited to the following areas:

• Cryptographic primitives
• Digital signatures
• Formal security model
• Lattice-based security reductions
• Pairing-based provably secure cryptography
• Privacy and anonymity technologies
• Provable secure block ciphers and hash functions
• Secure cryptographic protocols and applications
• Security notions, approaches, and paradigms
• Steganography and steganalysis

 

 

 

Copyright @ 2013 INSFORLAB @ FTMK, UTeM