posted by user: tell || 6961 views || tracked by 7 users: [display]

CT-RSA 2017 : RSA Conference Cryptographers’ Track 2017

FacebookTwitterLinkedInGoogle


Conference Series : The Cryptographer's Track at RSA Conference
 
Link: https://www.rambus.com/ct-rsa-2017/
 
When Feb 14, 2017 - Feb 17, 2017
Where RSA Conference USA, San Francisco
Submission Deadline Sep 3, 2016
Notification Due Nov 7, 2016
Final Version Due Nov 21, 2016
Categories    cryptography
 

Call For Papers

CT-RSA 2017

RSA Conference Cryptographers’ Track
San Francisco, February 14-17, 2017

Held in conjunction with RSA Conference USA

Call for Papers

Original research papers pertaining to all aspects of cryptography are solicited. Topics include but are not limited to:

Public-key algorithms
Symmetric-key algorithms
Hash functions and MAC algorithms
Random Number Generators
Cryptographic protocols
Cryptographic standards
Efficient implementations
Elliptic-curve cryptography
Post-quantum cryptography
CryptoCurrencies and blockchain
E-voting
Cryptanalysis
Hardware security
Tamper-resistance
Side-channel attacks and defenses
White-box cryptography


Important Dates

Submission Deadline: September 3, 2016 — 23:59 PDT (UTC-7)
Notification : November 7, 2016
Final Version of the Paper : November 21, 2016

All papers accepted for presentation will appear in the conference proceedings and will be published in the Lecture Notes in Computer Science series (www.springer.com/lncs). Authors of accepted papers must make their paper available online.

Submission Instructions

All submissions should be uploaded to the IACR WebReview system [link to be announced] in pdf format by the September 3rd deadline.

Submissions must not substantially duplicate work that any of the authors has published in a journal or in a conference or workshop with proceedings, or has submitted or is planning to submit before the author notification deadline to a journal or other conferences or workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings.
Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Each submission should begin with a title, a short abstract, and a list of keywords. Submissions should be at most 16 pages including the bibliography and should use the Springer LNCS format with no changes to the margins or fonts. Supplementary materials may be appended without a page limit, but reviewers are not required to read them. Submissions should be intelligible and self-contained within the 16 page bound. The same bound will be applied to those papers accepted for publication in the proceedings. Submissions not meeting these guidelines risk rejection without consideration of their merits.

Authors should report any “conflicts” with program committee members listed below. A conflict exists if an author and committee member have the same affiliation or have been co-authors on a paper within the past two years.

Program Committee

Josh Benaloh Microsoft Research, USA
Alex Biryukov University of Luxembourg, Luxembourg
Chen-Mou Cheng Osaka University, Japan
Jean Paul Degabriele Royal Holloway University of London, UK
Orr Dunkelman University of Haifa, Israel
Junfeng Fan Open Security Research, China
Henri Gilbert ANSSI, France
Tim Güneysu University of Bremen and DFKI, Germany
Helena Handschuh (Chair) Rambus Cryptography Research, USA
Stanislaw Jarecki University of California at Irvine, USA
Thomas Johansson Lund University, Sweden
Marc Joye NXP Semiconductors, USA
Kwangjo Kim KAIST, Republic of Korea
Susan Langford Hewlett-Packard Company, USA
Tancrede Lepoint SRI International, USA
Stefan Mangard Graz University of Technology, Austria
Mitsuru Matsui Mitsubishi Electric, Japan
Maria Naya Plasencia INRIA, France
Kaisa Nyberg Aalto University (retired), Finland
Elisabeth Oswald University of Bristol, UK
Raphael Phan Multimedia University, Malaysia
David Pointcheval École Normale Supérieure, France
Bart Preneel KULeuven and iMinds, Belgium
Matt Robshaw Impinj, USA
Rei Safavi-Naini University of Calgary, Canada
Kazue Sako NEC, Japan
Palash Sarkar Indian Statistical Institute, India
Nigel Smart University of Bristol, UK
Marc Stevens CWI, The Netherlands
Willy Susilo University of Wollongong, Australia
Huaxiong Wang Nanyang Technological University, Singapore
Brecht Wyseur Nagra, Switzerland

Related Resources

CT-RSA 2020   The Cryptographer's Track of the RSA Conference
IJITCA 2020   International Journal of Information Technology, Control and Automation
BCIOT for COINS 2020   Special Track on Blockchain and Internet of Things (IoT) for IEEE International Conference on Omni-layer Intelligent Systems
SPPR 2020   9th International Conference on Signal, Image Processing and Pattern Recognition
FedCSIS - SSE 2020   FedCSIS 2020 Track 5: Software and System Engineering (SSE)
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
VSC @IEEE WETICE 2020   Track on Validating Software for Critical Systems (VSC) @IEEE WETICE 2020
UBIC 2020   11th International Conference on Ubiquitous Computing
IoTHealthcare 2020   IEEE COINS | IoT , AI, and Big Data for Healthcare Track
Cyber Systems at HICSS 2021   Cyber Systems: Their Science, Engineering, and Security