posted by organizer: kenobicjj || 1809 views || tracked by 3 users: [display]

MyCRYPT 2016 : The International Conference on Cryptology & Malicious Security hosted in Malaysia

FacebookTwitterLinkedInGoogle

Link: https://foe.mmu.edu.my/mycrypt2016/?page_id=2
 
When Dec 1, 2016 - Dec 2, 2016
Where Kuala Lumpur, Malaysia
Submission Deadline Apr 30, 2016
Notification Due Jul 10, 2016
Final Version Due Sep 1, 2016
Categories    cryptography   security   malicious security   cryptology
 

Call For Papers

General Information

Original papers of substantial technical contribution in the areas of cryptology and malicious security are solicited for submission to the International Conference on Cryptology & Malicious Security hosted in Malaysia (Mycrypt 2016).

Note that the first & only Mycrypt thus far was in 2005; even back then it had a dedicated session on unconventional cryptography. Since then, substantial breakthroughs have been made in crypto in the past decade, including notions pertaining to malicious security, i.e. where security is no longer just against bad guys but where good guys who are conventionally viewed as mostly defensive can equally be adversarial. It is now time to rejuvenate the series with particular focus on paradigm-shifting crypto research & thinking outside the current box.

Submissions to Mycrypt 2016 should be aimed towards the following topic categories:

paradigm-shifting, unconventional cryptology (e.g. malicious crypto, unconventional formulations of underlying problems, or new hard problems)
position papers on breakthrough cryptologic/security research
revisits/critiques/analysis of long-standing crypto paradigms/approaches/models/formulations (in fact, we also encourage paired submissions by crypto factions of opposing views, where each paper in the pair argues for/against a paradigm)
approaches/solutions to long-standing open problems; or formulations of long-standing/thus-far adhoc security approaches
analysis of crypto/security standardization processes & how they may be subverted
cryptofications of the real world (e.g. new types of adversarial models and/or notions inspired by real world incidences/problems, modelling humans-in-the-security-loop)
crypto & beyond: cryptologic techniques in union with techniques from other disciplines
Other aspects of cryptology including conventional cryptology are welcome provided they make substantial contributions to the field of cryptology, to how the world views crypto or how crypto views the world. The gist is that we welcome all things non-conventional & paradigm-shifting.

Instructions for Authors

The submissions must be anonymous with no obvious references.
Submissions must be at most 20 pages excluding references and appendices, and maximally 30 pages in total; and be in 11pt fonts using Springer LNCS format with reasonable margins.

The main part of the paper should be intelligible as reviewers are not required to read the appendices. The introduction should summarize the main contributions of the paper so that it is understandable to a non-expert in cryptography.

Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The PC reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced.

Submissions not meeting these guidelines will be rejected without consideration of their merits.

Submitted papers must be in PDF format and should be submitted electronically via the submission server.

The reviewing process will involve two stages. Some papers will be rejected after stage 1, others will proceed to stage 2 and rebuttals will be requested from these authors. The rebuttals will be taken into consideration during the stage 2 of the PC discussion.

Proceedings

Mycrypt 2016 proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series, and will be available at the conference.
Authors of accepted papers must guarantee that their paper will be presented at the conference. The Mycrypt 2016 PC reserves the right to share information about misbehaving authors with other program committees.

Important dates

Submission deadline April 30, 2016 (23:59 UTC)
First round of comments July 10, 2016
Rebuttals due July 17, 2016
Notification of acceptance August 10, 2016
Camera ready version due September 1, 2016
Conference December 1 & 2, 2016


Program Chairs

Raphael C.-W. Phan
Multimedia University (MMU), Malaysia

Moti Yung
Google & Columbia University, USA

Related Resources

ACISP 2017   Australasian Conference on Information Security and Privacy
ICMWT 2017   4th International Conference on Mobile and Wireless Technology
TDSC-PSCE 2017   Special Issue on Paradigm Shifts in Cryptographic Engineering -- IEEE Transactions on Dependable and Secure Computing
IJISS 2016   International Journal of Information Security Science (IJISS)
CANS 2016   15th International Conference on Cryptology and Network Security
Big NLP 2016   Big Data and Natural Language Processing workshop hosted at IEEE Big Data 2016
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
MALCON 2016   11th IEEE International Conference on Malicious and Unwanted Software
SeMoCloud 2017   The International Workshop on The Security, Privacy, and Digital Forensics of Mobile Cloud