CRYPTO: International Cryptology Conference

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2017 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
CRYPTO 2016 The 36th International Cryptology Conference
Aug 14, 2016 - Aug 18, 2016 University of California, Santa Barbara Feb 9, 2016
CRYPTO 2015 International Cryptology Conference
Aug 16, 2015 - Aug 20, 2015 Santa Barbara, CA, USA Feb 11, 2015
CRYPTO 2013 International Cryptology Conference
Aug 18, 2013 - Aug 22, 2013 Santa Barbara California USA Feb 15, 2013
 
 

Present CFP : 2016

* Important Dates

Submission deadline: February 9, 2016, at 23:00 UTC (3:00 pm PST)
Paper notification: May 6, 2016
Final version due: June 3, 2016
Conference: August 14 - 18, 2016

* General Information

Original contributions on all technical aspects of cryptology are solicited for submission to Crypto 2016, the 36th Annual International Cryptology Conference. Submissions are welcome on any cryptographic topic including, but not limited to:
foundational theory,
the design, proposal, and analysis of cryptographic primitives,
secure implementation and optimization,
industry applications and innovative ``out-of-the-box'' proposals.
Crypto 2016 is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the Computer Science Department of the University of California, Santa Barbara. The proceedings of Crypto 2016 will be published by Springer in the LNCS series.

* Instructions for Authors

Submissions must be at most 30 pages using the Springer LNCS format, including title page, references, and figures. Optionally any amount of clearly marked supplementary material may be supplied, following after the main body of the paper or in separate files. However reviewers are not required to read or review any supplementary material and submissions are expected to be intelligible and complete without it. The final published version of an accepted paper is expected to closely match the submitted 30 pages.

Submissions should begin with a title, a short abstract, and a list of keywords. The introduction should summarize the contribution of the paper so that it is understandable to a non-expert in the field. Submissions must be presented in a way that allows the understanding and verification of the claimed results with reasonable time and effort.

Submissions must be anonymous, with no author names, affiliations, or obvious references. All submissions will be blind-refereed and submissions must not substantially duplicate published work or work that has been submitted in parallel to any other journal or conference/workshop with proceedings. All submissions to \conf are viewed as active submissions throughout the entire review period; they cannot be submitted to any other journal or conference/workshop with proceedings before the notification date. Accepted submissions cannot appear in any other conference or workshop that has proceedings. The IACR reserves the right to share information about submissions with other Program Committees. The IACR Policy on Irregular Submissions as well as Guidelines for Authors and other resources are all available via http://www.iacr.org/docs/.

Papers must be submitted electronically; a detailed description of the electronic submission procedure is available via the conference web-page. Submissions not meeting any of the guidelines above risk rejection without consideration of their merits. All accepted papers must conform to Springer publishing requirements and authors will be required to sign the IACR Copyright form when submitting the proceedings version of their papers. Authors must guarantee that their paper, if accepted, will be presented by one of the authors.

* Paper Awards

The Program Committee may choose a paper to receive an overall best paper award. In a continuing effort to promote independent work by researchers at an early stage in their career, the Program Committee may also award a prize for the best paper authored exclusively by early-career researchers. To be eligible, all co-authors must be studying full/part-time for a PhD or have received their PhD degree in 2014 or later. As usual, awards will only be given if deserving papers are identified.

* Stipends

The Cryptography Research Fund allows us to waive the registration fee for all student presenters of an accepted paper. A limited number of stipends will also be available to those students unable to obtain funding to attend the conference. Students in under-represented groups are especially encouraged to apply. Requests for stipends should be addressed to the General Chair and not to the Program Chairs.

* Program Committee

A. Biryukov, University of Luxembourg, LU.
A. Canteaut, INRIA, FR.
D. Catalano, Università di Catania, IT.
N. Chandran, Microsoft Research, IN.
M. Chase, Microsoft Research, US.
J. Daemen, STMicroelectronics, BE and Radboud University, NL.
E. De Mulder, Cryptographic Research, FR.
M. van Dijk, University of Connecticut, US.
I. Dinur, Ben-Gurion University, IL.
P.-A. Fouque, Université de Rennes 1, FR.
S. Galbraith, Auckland University, NZ.
S. Garg, University of California, Berkeley, US.
D. Gordon, George Mason University, US.
J. Groth, University College London, UK.
S. Ionica, Université de Picardie, FR.
T. Iwata, Nagoya University, JP.
A. Kiayias, National and Kapodistrian University of Athens, GR.
G. Leander, Ruhr Universität Bochum, DE.
S. Liu, Shanghai Jiao Tong University, CN.
A. May, Ruhr Universität Bochum, DE.
W. Meier, University of Applied Science, CH.
P. Mohassel, Yahoo Labs, US.
S. Myers, Indiana University, US.
P. Nguyen, University of Tokyo, JP.
K. Nyberg, Aalto University, FI.
K. Paterson, Royal Holloway Univ. of London, UK.
T. Peyrin, Nanyang Technological University, SG.
B. Pinkas, Bar Ilan University, IL.
D. Pointcheval, Ecole Normale Superieure, FR.
M. Prabhakaran, University of Illinois, US.
B. Preneel, KU Leuven, BE.
M. Raykova, Yale University, US.
C. Rechberger, TU-Graz, AT and DTU, DK.
M. Rosulek, Oregon State University, US.
R. Safavi-Naini, University of Calgary, CA.
A. Scafuro, Boston University, US and Northeastern University, US.
P. Schaumont, Virginia Tech, US.
D. Schröder, CISPA, Saarland University, DE.
J. H. Seo, Myongji University, KR.
Y. Seurin, ANSSI, FR.
A. Shelat, University of Virginia, US.
N. Smart, University of Bristol, UK.
R. Steinfeld, Monash University, AU.
M. Tibouchi, NTT Secure Platform Laboratories, JP.

* Advisory Member

Rosario Gennaro
The City College of New York
CRYPTO 2015 Program Co-Chair

* Contact Information

General Chair:

Brian LaMacchia
Microsoft Research
One Microsoft Way
Redmond, WA 98052,USA

Email: crypto2016@iacr.org

* Program Co-chairs:

Matthew Robshaw
Impinj, Inc.
701 N. 31st Street, Suite 300
Seattle, WA 98103, USA

Jonathan Katz
University of Maryland
Department of Computer Science
8223 Paint Branch Dr.
College Park, MD 20742, USA

Email: crypto2016programchairs@iacr.org
 

Related Resources

IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
CANS 2016   15th International Conference on Cryptology and Network Security
ORAJ 2016   Operations Research and Applications: An International Journal
ASIACRYPT 2016   The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
IJISS 2016   International Journal of Information Security Science (IJISS)
PAM 2017   Passive and Active Measurement Conference
MyCRYPT 2016   The International Conference on Cryptology & Malicious Security hosted in Malaysia
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
ICISC 2016   The 19th Annual International Conference on Information Security and Cryptology