Inscrypt: Information Security and Cryptology



Past:   Proceedings on DBLP

Future:  Post a CFP for 2016 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
Inscrypt 2015 11th International Conference on Information Security and Cryptology
Nov 1, 2015 - Nov 3, 2015 Beijing Aug 10, 2015
Inscrypt 2013 The 9th China International Conference on Information Security and Cryptology
Nov 27, 2013 - Nov 30, 2013 Guangzhou, China Aug 22, 2013

Present CFP : 2015

11th International Conference on Information Security and Cryptology
Inscrypt 2015
November 1 - 3, 2015, Beijing, China

--- In Cooperation with IACR ---

The 11th China International Conference on Information Security and Cryptology
(Inscrypt 2015) will be held in Beijing, from November 1 to 3, 2015, co-organized
by the State Key Laboratory of Information Security, the Chinese Association for
Cryptologic Research of China, and In Cooperation with IACR. It is an annual
conference targeting the top research results in the related area. Topics of
interest encompass research advances in ALL areas of information security,
cryptology, and their applications. Inscrypt 2015 seeks high-quality research
contributions in the form of well-developed papers, and two successive tracks for
crypto and security respectively will be organized. The conference proceedings
will be published by Springer-Verlag in LNCS series.

Authors are invited to submit full papers presenting new research results related
to cryptology, information security and their applications for either crypto track
or security track. All submissions must describe original research that is not published
or currently under review by another conference or journal. Areas of interest include,
but are not limited to:

Crypto Track:
Foundations of Cryptography
Provable Security
Sequences and Boolean Functions
Secure Multiparty Computation
Symmetric Key Cryptosystems
Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Key Management and Key Recovery
Security Protocols and Their Analysis
Information Hiding and Watermarking
Secure Computation Outsourcing
Functional Computation and Verifiable Computation
Leakage Resilient Cryptography

Security Track:
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Electronic Commerce Security
Intrusion Detection
Network Security
Security Modeling and Architectures
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Privacy Enhancing Technologies
Genomic Privacy and SDN Security
Big Data and Cloud Security

Instruction for Authors
Conference language is English. All submissions must be anonymous, with no author
names, affiliations, acknowledgments, or obvious references. It should begin with
a title, a short abstract, and a list of key words, and its introduction should
summarize the contributions of the paper at a level appropriate for a non-specialist
reader. The paper should be intelligible and self-contained within 20 pages including
references and appendices and must be submitted electronically to .
Submissions not meeting these guidelines risk rejection without consideration of their
merits. It is highly advised to prepare the submissions in the Springer LNCS format.
More information can be found at conference web site

Important Dates
Deadline for Submission: August 10, 2015
Notification of Acceptance: October 8, 2015
Pre-proceedings version deadline: October 15, 2015
Proceedings version deadline: December 3, 2015

Conference Chair:
Dan Meng, Institute of Information Engineering, CAS, China
Jianying Zhou, Institute for Infocomm Research, Singapore

Program Co-Chairs:
Dongdai Lin, Institute of Information Engineering, CAS, China
Xiaofeng Wang, Indiana University at Bloomington, USA
Moti Yung, Google Inc. & Columbia University, USA

Local Orgranizing committee Co-Chairs:
Chuankun Wu, Institute of Information Engineering, CAS, China
Yanping Yu, Chinese Association for Cryptologic Research, China

Publicity Chair
Kai Chen, SKLOIS, Institute of Information Engineering, CAS, China

Technical Program Committee
Erman Ayday Bilkent University, Turkey
Elisa Bertino Purdue University, USA
Ioana Boureanu Akamai Technologies Limited, UK
Kai Chen Institute of Information Engineering, CAS, China
Kefei Chen Hangzhou Normal University, China
Liqun Chen Hewlett-Packard Laboratories, UK
Xiaofeng Chen Xidian University, China
Sherman S. M. Chow Chinese University of Hong Kong, China
Nicolas Courtois University College London, UK
Laszlo Csirmaz Central European University, Hungary
Jintai Ding University of Cincinnati, USA
Cunsheng Ding Hong Kong University of Science and Technology, China
Yingfei Dong University of Hawaii, USA
Chun-I Fan National Sun Yat-sen University, Taiwan
Debin Gao Singapore Management University, Singapore
Dawu Gu Shanghai Jiao Tong University, China
Huaqun Guo Institute for Infocomm Research, Singapore
Jian Guo Nanyang Technological University, Singapore
Weili Han Fudan University, China
Feng Hao Newcastle University, UK
Tor Helleseth University of Bergen, Norway
Matt Henricksen Institute For Infocomm Research, Singapore
Lei Hu Institute of Information Engineering, CAS, China
Xinyi Huang Fujian Normal University, China
Mehmet Sabir Kiraz TUBITAK BILGEM, Turkey
Ninghui Li Purdue University, USA
Yingjiu Li Singapore Management University, Singapore
Tieyan Li Huawei, Singapore
Xin Li John Hopkins University, USA
Peng Liu The Pennsylvania State University, USA
Yang Liu Nanyang Technological University, Singapore
Di Ma University of Michigan-Dearborn, USA
Subhamoy Maitra Indian Statistical Institute, India
Florian Mendel Graz University of Technology, Austria
Atsuko Miyaji Japan Advanced Institute of Science and Technology, Japan
Maria Naya-Plasencia Inria, France
Giuseppe Persiano Universita di Salerno, Italy
Thomas Peters Ecole Normale Superieure, France
Josef Pieprzyk Queensland University of Technology, Australia
Bertram Poettering Ruhr University Bochum, Germany
Zhiyun Qian University of California, Riverside, USA
Longjiang Qu National University of Defense Technology, China
Giovanni Russello The University of Auckland, New Zealand
Seungwon Shin KAIST, Korea
Willy Susilo University of Wollongong, Australia
Shaohua Tang South China University of Technology, China
Vijay Varadharajan Macquarie University, Australia
Cong Wang City University of Hong Kong, China
Meiqin Wang Shandong University, China
Jian Weng Jinan University, China
Wenling Wu Institute of Software, CAS, China
Shouhuai Xu University of Texas at San Antonio, USA
Wenyuan Xu Zhejiang University, China
Danfeng Yao Virginia Tech, USA
Ting Yu Qatar Computing Research Institute, Qatar
Yu Yu Shanghai Jiao Tong University, China
Kehuan Zhang Chinese University of Hong Kong, China
Fangguo Zhang Sun Yat-sen University, China
Yuliang Zheng University of Alabama at Birmingham, USA
Vassilis Zikas ETH Zurich
Cliff Zou University of Central Florida, USA

Conference email

Related Resources

ICICT 2025   IEEE--2025 The 8th International Conference on Information and Computer Technologies (ICICT 2025)
CSP--EI 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICGDA--EI 2025   2025 8th International Conference on Geoinformatics and Data Analysis (ICGDA 2025)
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)
ICMIP 2025   2025 10th International Conference on Multimedia and Image Processing (ICMIP 2025)
Springer ICIM 2025   Springer--2025 the 11th International Conference on Information Management (ICIM 2025)
ICISC 2024   The 27th Annual International Conference on Information Security and Cryptology
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
DSIT 2024   2024 7th International Conference on Data Science and Information Technology (DSIT 2024)