CANS: Cryptology and Network Security

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2026 or later

 
 

All CFPs on WikiCFP

Event When Where Deadline
CANS 2025 Cryptology and Network Security
Nov 17, 2025 - Nov 20, 2025 Osaka,Japan Apr 17, 2025
CANS 2024 The International Conference on Cryptology and Network Security (CANS)
Sep 24, 2024 - Sep 27, 2024 Cambridge, UK Apr 24, 2024
CANS 2023 Cryptology and Network Security
Oct 31, 2023 - Nov 2, 2023 Augusta, Georgia, USA Jul 13, 2023
cans 2022 21st International Conference on Cryptology and Network Security Abu Dhabi, UAE
Nov 13, 2022 - Nov 16, 2022 The St. Regis - Corniche Rd - Abu Dhabi TBD
CANS 2021 Cryptology and Network Security
Dec 13, 2021 - Dec 15, 2021 Vienna, Austria Jun 17, 2021
CANS 2020 Cryptology and Network Security
Dec 14, 2020 - Dec 16, 2020 Vienna, Austria Jul 5, 2020
CANS 2019 Cryptology and Network Security
Oct 25, 2019 - Oct 27, 2019 Fuzhou, China May 6, 2019
CANS 2018 17th International Conference on Cryptology and Network Security
Sep 30, 2018 - Oct 3, 2018 Naples, Italy May 17, 2018
CANS 2016 15th International Conference on Cryptology and Network Security
Nov 14, 2016 - Nov 16, 2016 Milan, Italy Jul 20, 2016
CANS 2014 13rd International Conference on Cryptology and Network Security
Oct 22, 2014 - Oct 24, 2014 Heraklion Crete, Greece Jun 20, 2014 (Jun 17, 2014)
CANS 2013 International Conference on Cryptology and Network Security
Nov 20, 2013 - Nov 22, 2013 Paraty, Brazil Jun 11, 2013
CANS 2012 11th International Conference on Cryptology and Network Security
Dec 12, 2012 - Dec 14, 2012 Darmstadt, Germany Jul 15, 2012
CANS 2010 The Ninth International Conference on Cryptology And Network Security (CANS 2010)
Dec 12, 2010 - Dec 14, 2010 Malaysia Jun 18, 2010
CANS 2009 The 8th International Conference on Cryptology and Network Security
Dec 12, 2009 - Dec 14, 2009 Kanazawa, Japan Jun 17, 2009
 
 

Present CFP : 2025

The 24th International Conference on Cryptology and Network Security
(CANS 2025)
https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html
17th - 20th November 2025, Osaka, Japan

Program Committee Chairs

Mehdi Tibouchi Nippon Telegraph and Telephone Corporation
Yongdae Kim Korea Advanced Institute of Science and Technology


About the conference

The International Conference on Cryptology and Network Security (CANS)
is a premier forum for presenting research in the field of cryptology
and network security. The conference seeks academic, industry, and
government submissions on all theoretical and practical aspects of
cryptology and network security. This year marks the 24th iteration of
the conference and will be held at Osaka, Japan. Proceedings of this
year's conference will be published by Springer LNCS; proceedings of
previous iterations of the conference can be found online.

Submission guidelines

High quality papers on unpublished research and implementation
experiences may be submitted. All papers must be original and not
substantially duplicate work that has been published at, or is
simultaneously submitted to, a journal or another conference or workshop
with proceedings. All submissions must be written in English and span no
more than 20 pages in the Springer’s Lecture Notes in Computer Science
(LNCS) format, including title, abstract, and bibliography. The
introduction should summarize the contributions of the paper at a level
understandable by a non-expert reader and explain the context to related
work.
Submitted papers may contain supplementary material in the form of
well-marked appendices or a separate file archive (particularly for
source code, data files, etc.). Note that supplementary material will
not be included in the proceedings. Moreover, the main paper should be
intelligible without requiring the reader to consult the supplementary
material; the reviewers may optionally refer to the supplementary
material, but are also permitted to base their assessment on the main
paper alone.

Submissions must be anonymous (no author names, affiliations,
acknowledgments, or obvious references). The conference will also
consider short papers of up to eight pages in the LNCS format, excluding
the bibliography (max 2 pages), for results that are not yet fully
fleshed out or that simply require fewer pages to describe but still
make a significant contribution.
All submissions must be processed with LaTeX2e according to the
instructions given by Springer. Submitted manuscripts must be typeset in
plain Springer LNCS format, in particular without changing the font
size, margins or line spacing. Submissions not meeting these guidelines
may be rejected without consideration of their merits.
Papers must be submitted via EasyChair. The deadline for submissions is
17 April anywhere on earth (AoE).

Important dates
Submission: 17 April AoE. Papers must be submitted via EasyChair.
Notification: 10 July
Camera-ready: 14 August
Conference: 17–20 November

Presentation requirements
At least one author of every accepted paper must register and pay the
full registration fee (non-student) for the conference by the early
registration deadline indicated by the organizers. Papers without a
registered author will be removed from the sessions. Authors must
present their own paper(s). Session proceedings, including all accepted
papers, will be published in LNCS and will be available at the
conference.

Topic areas
Access Control
Anonymity and Censorship Resistance
Applied Cryptography
Biometrics
Block Ciphers & Stream Ciphers
Blockchain/Cryptocurrency Security and Privacy
Confidential Computing
Cryptographic Algorithms and Primitives
Cryptographic Protocols
Cyber Attack (DDoS, Botnets, APTs) prevention, detection and response
Cyber-crime defense and forensics
Data and Application Security
Denial of Service Protection
Data and Computation Integrity
Edge/Fog Computing Security and Privacy
Embedded System Security
Formal Methods for Security and Privacy
Hash Functions
Identity Management and Privacy
IoT (e.g., smart homes, IoT, body-area networks, VANETs) Security
Key Management
Location Based Services Security and Privacy
Malware Analysis, Detection and Prevention
Machine Learning for Security
Network protocol (routing, management) security
Online Social Networks Security and Privacy
Peer-to-Peer Security and Privacy
Post-Quantum Cryptography and Cryptanalysis
Privacy and anonymity in networks and distributed systems
Privacy-Enhancing Technologies
Public-Key Cryptography and Cryptanalysis
Security for Cloud/Edge computing
Security for cyber-physical systems (e.g., autonomous vehicles,
industrial control systems)
Security and Privacy of ML and AI-Based Systems
Security and Resilient Solutions for Critical Infrastructures (e.g.,
electronic voting, smart grid)
Security Architectures
Security in Content Delivery
Security Models
Secure Multi-Party Computation
Secure Distributed Computing
Side-Channel Attacks and Countermeasures
Trust Management
Usable Security
Virtual Private Networks
Web Security (incl. social networking, crowd-sourcing, fake
news/disinformation)Wireless and Mobile Security
Zero-Knowledge Proofs
 

Related Resources

CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ACIE--EI 2025   2026 The 6th Asia Conference on Information Engineering (ACIE 2026)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICDMIS 2025   International Conference on Data Mining and Information Security
ICCNS--EI 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
SECRYPT 2025   22nd International Conference on Security and Cryptography
SECURWARE 2025   The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
ICCNS 2025   2025 15th International Conference on Communication and Network Security (ICCNS 2025)