posted by user: qkraudtj91 || 2272 views || tracked by 1 users: [display]

ICISC 2025 : The 28th Annual International Conference on Information Security and Cryptology

FacebookTwitterLinkedInGoogle


Conference Series : International Conference on Information Security and Cryptology
 
Link: http://www.icisc.org/
 
When Nov 19, 2025 - Nov 21, 2025
Where Seoul, Korea
Submission Deadline Sep 5, 2025
Notification Due Oct 29, 2025
Final Version Due Nov 5, 2025
Categories    cryptography   cyber security
 

Call For Papers

Original research papers on all aspects of theory and applications of information security and cryptology are solicited for submission to ICISC 2025, the 28th Annual International Conference on Information Security and Cryptology which is sponsored by NSR(National Security Research Institute) and KIISC (Korean Institute of Information Security and Cryptology), Korea.

Cryptography Track
● Authentication and Authorization
● Biometrics
● Blockchain Security
● Block and Stream Ciphers
● Copyright Protection
● Cryptographic Protocols
● Cryptanalysis
● Digital Forensics
● Digital Signature
● Distributed Systems Security
● Efficient Cryptography Implementation
● Functional encryption
● Hash Function
● Homomorphic Encryption
● ID-based Cryptography
● Intrusion Detection and Prevention
● Information Hiding
● Key Management
● Post-quantum cryptography
● Privacy Enhancement
● Public Key Cryptography
● Side Channel Attacks and Countermeasures
● Secure Multiparty Computation
● Software Security
● Smart Device Security
● Zero-knowledge proofs

Security Track
● Analysis of network and security protocols
● Anonymity and censorship-resistant technologies
● Applications of cryptographic techniques
● Authentication and authorization
● Automated tools for source code/binary analysis
● Automobile security
● Botnet defense
● Critical infrastructure security
● Denial-of-service attacks and countermeasures
● Embedded systems security
● Exploit techniques and automation
● Hardware and physical security
● HCI security and privacy
● Malware analysis
● Mobile/wireless/cellular system security
● Network-based attacks
● Network infrastructure security
● Operating system security
● Practical cryptanalysis (hardware, DRM, etc.)
● Security policy
● Techniques for developing secure systems
● Trustworthy computing
● Trusted execution environments
● Unmanned System Security
● Vulnerability research
● Web Security

Related Resources

ACM ICICA 2026   ACM--2026 The 15th International Conference on Information Communication and Applications (ICICA 2026)--ESCI
ICAISM 2026   2026 2nd International Conference on Artificial Intelligence and Smart Manufacturing-EI/Scopus
ICSPS 2026   IEEE--2026 the 18th International Conference on Signal Processing Systems (ICSPS 2026)
ICITA 2026   21st International Conference on Information Technology and Application (ICITA)
IEEE-Ei/Scopus-ICISC 2026   2025 6th International Conference on Intelligent System and Computing (ICISC 2026)
CYBER 2026   The Eleventh International Conference on Cyber-Technologies and Cyber-Systems
ICICA--ESCI 2026   ACM--2026 The 15th International Conference on Information Communication and Applications (ICICA 2026)--ESCI
AICyS 2026   The 2026 International Conference on Artificial Intelligence and Cyber Security (AICyS 2026)
ACM ICISS 2026   ACM--2026 The 9th International Conference on Information Science and Systems (ICISS 2026)
ICISS 2026   ACM--2026 The 9th International Conference on Information Science and Systems (ICISS 2026)