posted by organizer: kenobicjj || 6834 views || tracked by 3 users: [display]

MyCRYPT 2016 : The International Conference on Cryptology & Malicious Security hosted in Malaysia


When Dec 1, 2016 - Dec 2, 2016
Where Kuala Lumpur, Malaysia
Submission Deadline Apr 30, 2016
Notification Due Jul 10, 2016
Final Version Due Sep 1, 2016
Categories    cryptography   security   malicious security   cryptology

Call For Papers

General Information

Original papers of substantial technical contribution in the areas of cryptology and malicious security are solicited for submission to the International Conference on Cryptology & Malicious Security hosted in Malaysia (Mycrypt 2016).

Note that the first & only Mycrypt thus far was in 2005; even back then it had a dedicated session on unconventional cryptography. Since then, substantial breakthroughs have been made in crypto in the past decade, including notions pertaining to malicious security, i.e. where security is no longer just against bad guys but where good guys who are conventionally viewed as mostly defensive can equally be adversarial. It is now time to rejuvenate the series with particular focus on paradigm-shifting crypto research & thinking outside the current box.

Submissions to Mycrypt 2016 should be aimed towards the following topic categories:

paradigm-shifting, unconventional cryptology (e.g. malicious crypto, unconventional formulations of underlying problems, or new hard problems)
position papers on breakthrough cryptologic/security research
revisits/critiques/analysis of long-standing crypto paradigms/approaches/models/formulations (in fact, we also encourage paired submissions by crypto factions of opposing views, where each paper in the pair argues for/against a paradigm)
approaches/solutions to long-standing open problems; or formulations of long-standing/thus-far adhoc security approaches
analysis of crypto/security standardization processes & how they may be subverted
cryptofications of the real world (e.g. new types of adversarial models and/or notions inspired by real world incidences/problems, modelling humans-in-the-security-loop)
crypto & beyond: cryptologic techniques in union with techniques from other disciplines
Other aspects of cryptology including conventional cryptology are welcome provided they make substantial contributions to the field of cryptology, to how the world views crypto or how crypto views the world. The gist is that we welcome all things non-conventional & paradigm-shifting.

Instructions for Authors

The submissions must be anonymous with no obvious references.
Submissions must be at most 20 pages excluding references and appendices, and maximally 30 pages in total; and be in 11pt fonts using Springer LNCS format with reasonable margins.

The main part of the paper should be intelligible as reviewers are not required to read the appendices. The introduction should summarize the main contributions of the paper so that it is understandable to a non-expert in cryptography.

Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The PC reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced.

Submissions not meeting these guidelines will be rejected without consideration of their merits.

Submitted papers must be in PDF format and should be submitted electronically via the submission server.

The reviewing process will involve two stages. Some papers will be rejected after stage 1, others will proceed to stage 2 and rebuttals will be requested from these authors. The rebuttals will be taken into consideration during the stage 2 of the PC discussion.


Mycrypt 2016 proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series, and will be available at the conference.
Authors of accepted papers must guarantee that their paper will be presented at the conference. The Mycrypt 2016 PC reserves the right to share information about misbehaving authors with other program committees.

Important dates

Submission deadline April 30, 2016 (23:59 UTC)
First round of comments July 10, 2016
Rebuttals due July 17, 2016
Notification of acceptance August 10, 2016
Camera ready version due September 1, 2016
Conference December 1 & 2, 2016

Program Chairs

Raphael C.-W. Phan
Multimedia University (MMU), Malaysia

Moti Yung
Google & Columbia University, USA

Related Resources

DASFAA 2022   Database Systems for Advanced Applications
NeTCoM 2023   15th International Conference on Networks & Communications
NISS 2023   The 6th of International Conference on Networking, Intelligent Systems & Security
SVC 2023   4th International Conference on Signal Processing, VLSI Design & Communication Systems
IEEE CCNC STP-CPS 2023   5th International Workshop on Security Trust Privacy for Cyber-Physical Systems (STP-CPS'23) with IEEE CCNC 2023, 8-11 January, Las Vegas, NV, USA
IOTBC 2023   International Conference IOT, Blockchain and Cryptography
SI on ATD&IS II 2023   Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI
EICC 2023   European Interdisciplinary Cybersecurity Conference (EICC 2023)
CMC 2023   9th International Conference on Control, Modeling and Computing