ECRYPT's virtual lab VAMPIRE organizes SPEED - Software Performance Enhancement for Encryption and Decryption. SPEED addresses the speed of secret-key and public-key cryptography. Speed improvements can come from better systems, better algorithms, and better software.
SPEED's origin is eBATS, the ECRYPT competition on public key cryptography and one of SPEED's purposes is to provide a forum for the BAT submitters and encourage work investigating the security of the BATs. Compilers constitute an important part of software generation and better compilers can achieve higher speed and security and ease the task for the programmer. We therefore also welcome submissions on this topic.
There will be a few invited talks along with contributed talks which are selected based on submitted papers and a refereeing process. (As for all ECRYPT conferences, there will be no formal proceedings for SPEED but a workshop record with all accepted papers.)
There will be no formal proceedings, but a handout with abstracts will
be provided to all participants. (This avoids submissions to SPEED
from conflicting with submissions to forthcoming conferences with
Call for contributions: SPEED_CFP.txt
|April 6, 2007:||submission of papers|
|May 11, 2007:||notification of acceptance or rejection|
|May 25, 2007:||revised version of accepted papers due|
|June 11-12, 2007:||SPEED workshop in Amsterdam|
The submission should start with a title, a list of the authors
together with their affiliations and a short abstract describing the
content of the paper. This should be followed by an extended abstract
of at least 5 and at most 20 pages including appendices. The authors
of accepted papers must guarantee to present their paper at the
List of accepted papers for SPEED You can find the workshop version of the papers in the booklet distributed at the workshop. Note that an update of Mike Scott's paper is available below.
For further information please contact
|SPEED is organized within ECRYPT - European Network of Excellence for Cryptology. We acknowledge the support by the European Commission under the IST program, IST-2002-507932|
|We acknowledge organizational support from Coding theory & Cryptology group, Technische Universiteit Eindhoven.|