ICISC: International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2026 or later

 
 

All CFPs on WikiCFP

Event When Where Deadline
ICISC 2025 The 28th Annual International Conference on Information Security and Cryptology
Nov 19, 2025 - Nov 21, 2025 Seoul, Korea Sep 5, 2025
ICISC 2024 The 27th Annual International Conference on Information Security and Cryptology
Nov 20, 2024 - Nov 22, 2024 Seoul Sep 6, 2024
ICISC 2022 25th Annual International Conference on Information Security and Cryptology
Nov 30, 2022 - Dec 2, 2022 Hotel Koreana, Seoul Sep 2, 2022
ICISC 2018 International Conference on Information Security and Cryptology
Nov 28, 2018 - Nov 30, 2018 Seoul, Korean Aug 29, 2018
ICISC 2016 The 19th Annual International Conference on Information Security and Cryptology
Nov 30, 2016 - Dec 2, 2016 Seoul, Korea Aug 26, 2016
ICISC 2015 The 18th Annual International Conference on Information Security and Cryptology
Nov 25, 2015 - Nov 27, 2015 Seoul, Korea Aug 31, 2015
ICISC 2014 The 17th Annual International Conference on Information Security and Cryptology
Dec 3, 2014 - Dec 5, 2014 Seoul, Korea Sep 4, 2014
ICISC 2013 The 16th Annual International Conference on Information Security and Cryptology
Nov 27, 2013 - Nov 29, 2013 Seoul, Korea Sep 9, 2013
ICISC 2012 International Conference on Information Security and Cryptology
Nov 28, 2012 - Nov 30, 2012 Seoul, Korea Aug 28, 2012
 
 

Present CFP : 2025

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2025, the 28th Annual International Conference on Information Security and Cryptology which is sponsored by NSR(National Security Research Institute) and KIISC (Korean Institute of Information Security and Cryptology), Korea.

Cryptography Track
● Authentication and Authorization
● Biometrics
● Blockchain Security
● Block and Stream Ciphers
● Copyright Protection
● Cryptographic Protocols
● Cryptanalysis
● Digital Forensics
● Digital Signature
● Distributed Systems Security
● Efficient Cryptography Implementation
● Functional encryption
● Hash Function
● Homomorphic Encryption
● ID-based Cryptography
● Intrusion Detection and Prevention
● Information Hiding
● Key Management
● Post-quantum cryptography
● Privacy Enhancement
● Public Key Cryptography
● Side Channel Attacks and Countermeasures
● Secure Multiparty Computation
● Software Security
● Smart Device Security
● Zero-knowledge proofs

Security Track
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Critical infrastructure security
● Denial-of-service attacks and countermeasures
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Security policy
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments
● Unmanned System Security
● Vulnerability research
● Web Security
 

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2
CAIJ 2026   Computer Applications: An International Journal
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 1
ICITA 2026   ICITA 2026: 20th International Conference on Information Technology and Applications
Information Technology for Smart Healthc 2025   Information Technology for Smart Healthcare
ICITA 2026   21st International Conference on Information Technology and Application (ICITA)
AI Security & Privacy 2025   First International Workshop on Artificial Intelligence Security and Privacy
WAPAIS 2026   5th Workshop on Applications of Artificial Intelligence for Society
CBMS 2025 - ST Security and Privacy 2025   CBMS 2025 - Special Track: Security and Privacy in Health Systems: Addressing Technology, Society, and Law