PKC: Public Key Cryptography



Past:   Proceedings on DBLP

Future:  Post a CFP for 2018 or later   |   Invite the Organizers Email


All CFPs on WikiCFP

Event When Where Deadline
PKC 2017 20th International Conference on Practice and Theory of Public-Key Cryptography
Mar 28, 2017 - Mar 28, 2017 Amsterdam, Netherlands Oct 6, 2016
PKC 2016 19th International Conference on the Theory and Practice of Public-Key Cryptography
Mar 6, 2016 - Mar 9, 2016 Tapei, Taiwan Oct 5, 2015

Present CFP : 2017

Important Dates

Submission deadline: October 6, 2016, 19:00 UTC
Author notification: December 15, 2016
Proceedings version deadline: January 10, 2017
Conference: March 28-31, 2017

General Information

This is the 20th edition of the International Conference on Practice and Theory of Public Key Cryptography, the main annual conference with an explicit focus on public-key cryptography, sponsored by IACR, the International Association for Cryptologic Research. Original research papers on all aspects of public-key cryptography, covering theory, implementations and applications, are solicited for submission to PKC 2017. Accepted papers will be published by Springer in their Lecture Notes in Computer Science series.

Instructions for Authors

Submissions should be prepared using LaTeX and must be in the standard Springer LNCS format, with the (only) modification that page numbers must be displayed — this can be done by putting \pagestyle{plain} into the preamble. Submissions should begin with a title and a short abstract, followed by an introduction that summarizes the contribution of the paper so that it is understandable to a non-expert in the field. Submissions must be anonymous, with no author names, affiliations, or obvious references.

Submissions must be at most 30 pages, including title page, references, and figures. The final published version of an accepted paper is expected to closely match these submitted pages. If necessary, clearly marked supplementary material (of unbounded size) may be appended to the actual submission. However, submissions are expected to be intelligible and verifiable without the supplementary material; reviewers are not required to read it. In particular, it is discouraged to move crucial proofs into the supplementary material, and in cases where this is unavoidable it is expected that a short but convincing proof sketch is provided in the main body.

Submissions must not substantially duplicate published work or work that has been submitted in parallel to any other journal or conference/workshop with proceedings. All submissions to PKC 2017 are viewed as active submissions throughout the entire review period; they cannot be submitted to any other journal or conference/workshop with proceedings before the notification date. Accepted submissions cannot appear in any other conference or workshop that has proceedings. IACR reserves the right to share information about submissions with other program committees. The IACR Policy on Irregular Submissions and Guidelines for Authors, as well as other resources, are all available via

Papers must be submitted electronically; a detailed description of the electronic submission procedure will be available via the conference web-page Submissions not meeting any of the guidelines above risk rejection without consideration of their merits. All accepted papers must conform to Springer publishing requirements and authors will be required to sign the IACR Copyright and Consent Form when submitting the proceedings version of their papers. Authors must guarantee that their paper, if accepted, will be presented at the conference by one of the authors.

Contact Information

All correspondence and/or questions should be directed to either of the organizational committee members.

Related Resources

ECML-PKDD 2017   European Conference on Machine Learning and Principles and Practice of Knowledge Discovery
IJCIS 2017   International Journal on Cryptography and Information Security
WICS 2017   4th International Workshop on Information and Communication Security
SOFSEM 2018   44th International Conference on Current Trends in Theory and Practice of Computer Science
ICCSP - Ei 2018   2018 the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018)--Ei Compendex and Scopus
ESORICS 2017   Twenty-second European Symposium on Research in Computer Security
NISK 2017   NISK 2017: The Norwegian Information Security Conference 2017
SECRYPT 2017   14th International Conference on Security and Cryptography
ACNS 2017   The 15th International Conference on Applied Cryptography and Network Security
ACISP 2017   Australasian Conference on Information Security and Privacy