posted by system || 2460 views || tracked by 1 users: [display]

CRYPTO 2015 : International Cryptology Conference


Conference Series : International Cryptology Conference
When Aug 16, 2015 - Aug 20, 2015
Where Santa Barbara, CA, USA
Submission Deadline Feb 11, 2015
Notification Due May 9, 2015
Final Version Due Jun 12, 2015

Call For Papers

Important Dates

Submission deadline: February 11, 2015, 22:00 UTC (5:00 pm EST)
Paper notification: May 9, 2015
Final version due: June 12, 2015
Conference: August 16 - 20, 2015
General Information

Original contributions on all technical aspects of cryptology are solicited for submission to Crypto 2015, the 35th Annual International Cryptology Conference. Submissions are welcome on any cryptographic topic including, but not limited to:

foundational theory,
the design, proposal, and analysis of cryptographic primitives,
implementation security and optimization,
industry application, and innovative ``out-of-the-box'' proposals.
Crypto 2015 is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the Computer Science Department of the University of California, Santa Barbara.

The proceedings of Crypto 2015 will be published by Springer in the LNCS series.

Instructions for Authors

Submissions must be at most 18 pages using the Springer LNCS format, excluding references and any supplementary material. Details on the LNCS format can be obtained via The final published version of an accepted paper is expected to closely match these 18 pages.

Submissions must be submitted electronically and the submission procedure is described on the conference web-page. All submissions will be blind-refereed and submissions must be anonymous, with no author names, affiliations, or obvious references. They should begin with a title, a short abstract, and a list of keywords. The introduction should summarize the contribution of the paper so that it is understandable to a non-expert in the field. Optionally, if an author desires, a clearly-marked appendix containing supplementary material can be appended to the submission after the references. This appendix has no prescribed form or page limit and might be used, for instance, to provide program code or additional experimental data. However reviewers are not required to read or review any supplementary material and submissions are expected to be intelligible and complete without it.

The IACR Policy on Irregular Submissions is available via Submissions must not substantially duplicate published work or work that has been submitted in parallel before, or during Crypto 2015 review, to any other journal or conference/workshop with proceedings. Accepted submissions cannot appear in any other conference or workshop that has proceedings. The program chairs may share information about submitted papers with other conference chairs to ensure adherence to this policy.

Accepted papers must conform to Springer publishing requirements and authors will be required to sign the IACR Copyright form. Authors must guarantee that their paper, if accepted, will be presented at the conference by one of the authors.

Best Young Researcher Paper Award

The Program Committee may award an overall best paper award. In a continuing effort to promote independent work by young researchers, the Program Committee may also award a prize for the best paper that is authored exclusively by young researchers. To be eligible, all co-authors must be either full-time students or have received their PhD degree in 2013 or later. As usual, awards will be given only if deserving papers are identified.


The Cryptography Research Fund allows us to waive the registration fee for all students presenters of an accepted paper. A limited number of stipends will be available to those students unable to obtain funding to attend the conference, and to students having an accepted paper that they will present. Students in under-represented groups are especially encouraged to apply. Requests for stipends should be addressed to the General Chair.

Program Committee

M. Abdalla, École Normale Supérieure and CNRS, FR.
M. Abe, NTT Labs, JP.
P. Barreto, University of Sao Paulo, BR.
C. Boyd, Norwegian University of Science and Technology, NO.
Z. Brakerski, Weizmann Institute of Science, IL.
E. Bresson, Airbus Cybersecurity, FR.
A. Canteaut, INRIA, FR.
D. Catalano, Università di Catania, IT.
N. Chandran, Microsoft Research, IN.
M. Chase, Microsoft Research, US.
J. Daemen, STMicroelectronics, BE.
K. El~Defrawy, HRL Laboratories, US.
O. Dunkelman, University of Haifa, IL.
D. Fiore, IMDEA Software Institute, ES.
S. Galbraith, Auckland University, NZ.
S. Garg, University of California, Berkeley, US.
C. Hazay, Bar-Ilan University, IL.
T. Iwata, Nagoya University, JP.
S. Jarecki, University of California, Irvine, US.
T. Johansson, Lund University, SE.
L.R. Knudsen, Technical University of Denmark, DK.
G. Leander, Ruhr-Universität Bochum, DE.
A. Bishop Lewko, Columbia University, US.
H. Lin, University of California, Santa Barbara, US.
M. Matsui, Mitsubishi Electric, JP.
S. Meiklejohn, University College London, UK.
D. Micciancio, University of California, San Diego, US.
S. Myers, Indiana University, US.
B. Parno, Microsoft Research, US.
G. Persiano, Università di Salerno, IT.
T. Peyrin, Nanyang Technological University, SG.
J. Pieprzyk, Queensland University of Technology, AU.
A. Poschmann, NXP Semiconductors, DE.
B. Preneel, KU Leuven, BE.
C. Ràfols, Ruhr-Universität Bochum, DE.
M. Raykova, SRI International, US.
P. Sarkar, Indian Statistical Institute, IN.
N. Smart, University of Bristol, UK.
F.-X. Standaert, Université catholique de Louvain, BE.
J. Steinberger, Tsinghua University, CN.

Advisory Member

Juan Garay
Yahoo Labs
CRYPTO 2014 Program Co-Chair

Contact Information

General Chair:

Thomas Ristenpart
University of Wisconsin
1210 West Dayton Street
Madison, WI 53703, USA

Program Co-chairs:

Rosario Gennaro
The City College of New York
Shepard Hall, 279
160 Convent Avenue
New York, NY 10031, USA Matthew Robshaw
Impinj, Inc.
701 N. 31st Street, Suite 300
Seattle, WA 98103, USA

Related Resources

CRYPTO 2016   The 36th International Cryptology Conference
CANS 2016   15th International Conference on Cryptology and Network Security
ASIACRYPT 2016   The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
IJISS 2016   International Journal of Information Security Science (IJISS)
ICISC 2016   The 19th Annual International Conference on Information Security and Cryptology
MyCRYPT 2016   The International Conference on Cryptology & Malicious Security hosted in Malaysia
FoSec 2016   Call for Book Chapters in Innovation in Multimedia Forensics and Security: Theory and Practice