posted by user: tell || 3485 views || tracked by 22 users: [display]

ASIACRYPT 2016 : The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security


When Dec 4, 2016 - Dec 8, 2016
Where Hanoi, Vietnam
Submission Deadline May 20, 2016
Notification Due Jul 10, 2016
Final Version Due Sep 7, 2016
Categories    cryptography   security   information security

Call For Papers

Original research papers on all technical aspects of cryptology are solicited for submission to ASIACRYPT 2016, the 22nd Annual International Conference on Theory and Application of Cryptology and Information Security.
Instructions for Authors

Submissions must be at most 30 pages using the Springer LNCS format, excluding any auxiliary supporting material. Details on the Springer LNCS format can be obtained via All submissions must have page numbers, e.g., using Latex command \pagestyle{plain}.

Submissions must be submitted electronically in the PDF format, and the submission procedure and the submission link will be announced at the conference website at a later date. All submissions will be blind-refereed and submissions must be anonymous, with no author names, affiliations, or obvious references. Submissions should begin with a title, a short abstract, and a list of keywords, followed by an introduction, a main body, an appendix (if any), and references, within 30 pages. The introduction should summarize the contributions of the paper at the level understandable for a non-expert reader.

Optionally, if an author desires, a clearly-marked auxiliary supporting material can be appended after the submission. The auxiliary supporting material has no prescribed form or page limit and might be used, for instance, to provide program code or additional experimental data. Alternatively, the auxiliary supporting material can be submitted as a separate file from the submission. The reviewers are not required to read the auxiliary supporting material and submissions should be intelligible without it. Submissions not meeting these guidelines risk rejection without consideration of their merits. In particular, the Springer LNCS format must be used without changing margins.

It is strongly encouraged that submissions are processed in LATEX. Authors should refer to the instructions listed on for typesetting their manuscripts. These instructions are mandatory for the final papers.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference/workshop that has proceedings. IACR reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced. For further details, see

For papers that are accepted, the length of the proceedings version will be at most 30 pages in the Springer LNCS format. The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series and will be available at the conference. Authors of accepted papers must complete the IACR copyright assignment form available at for their work to be published in the proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference.

The Program Committee may select a paper for the best paper award.

* Schedule

Asiacrypt 2016 will operate a two-round review system with rebuttal phase. In the first round the program committee selects the submissions which are considered of value for proceeding to the second round, and the authors receive the first round notification with review comments. The authors of the selected submissions are invited to submit a text-based rebuttal letter to the review comments. In the second round the program committee further reviews the submissions by taking into account their rebuttal letter, and makes the final decision of acceptance or rejection.

The schedule is as follows:

Submission deadline: May 20, 2016, 2:00 a.m. UTC.
First round notification: July 10, 2016.
Rebuttals due: July 15, 2016.
Final notifications of acceptance or rejection: August 14, 2016.
Camera-ready version due: September 7, 2016.
Conference: Sunday December 4 to Thursday December 8, 2016.

* Stipends for Student Speakers

Students presenting a paper at ASIACRYPT 2016 will have a chance to get his or her registration fee waived. If you are a student speaker, please contact the General Chairs or Conference Secretariat before online registration. More details in Stipends.

* Stipends for Local Participants

We get some funds which allows us to waive/reduce the registration fee to support some local participants who would otherwise be unable to attend the conference. We particularly encourage applications for stipends from women and other under represented groups.

Related Resources

ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
ICITA 2017   International Conference on Information Technology and Applications
ORAJ 2016   Operations Research and Applications: An International Journal
IJISS 2016   International Journal of Information Security Science (IJISS)
CIKM 2017   The 26th 2017 ACM Conference on Information and Knowledge Management
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
AIP Special Issue 2016   Journal Acta Informatica Pragensia - Special Issue on Systems
FC 2017   Financial Cryptography and Data Security 2017
DICTAP 2017   The Seventh International Conference on Digital Information and Communication Technology and Applications