posted by user: tell || 14161 views || tracked by 28 users: [display]

ASIACRYPT 2016 : The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security

FacebookTwitterLinkedInGoogle

Link: http://www.asiacrypt2016.com/
 
When Dec 4, 2016 - Dec 8, 2016
Where Hanoi, Vietnam
Submission Deadline May 20, 2016
Notification Due Jul 10, 2016
Final Version Due Sep 7, 2016
Categories    cryptography   security   information security
 

Call For Papers

Original research papers on all technical aspects of cryptology are solicited for submission to ASIACRYPT 2016, the 22nd Annual International Conference on Theory and Application of Cryptology and Information Security.
Instructions for Authors

Submissions must be at most 30 pages using the Springer LNCS format, excluding any auxiliary supporting material. Details on the Springer LNCS format can be obtained via http://www.springer.de/comp/lncs/authors.html. All submissions must have page numbers, e.g., using Latex command \pagestyle{plain}.

Submissions must be submitted electronically in the PDF format, and the submission procedure and the submission link will be announced at the conference website at a later date. All submissions will be blind-refereed and submissions must be anonymous, with no author names, affiliations, or obvious references. Submissions should begin with a title, a short abstract, and a list of keywords, followed by an introduction, a main body, an appendix (if any), and references, within 30 pages. The introduction should summarize the contributions of the paper at the level understandable for a non-expert reader.

Optionally, if an author desires, a clearly-marked auxiliary supporting material can be appended after the submission. The auxiliary supporting material has no prescribed form or page limit and might be used, for instance, to provide program code or additional experimental data. Alternatively, the auxiliary supporting material can be submitted as a separate file from the submission. The reviewers are not required to read the auxiliary supporting material and submissions should be intelligible without it. Submissions not meeting these guidelines risk rejection without consideration of their merits. In particular, the Springer LNCS format must be used without changing margins.

It is strongly encouraged that submissions are processed in LATEX. Authors should refer to the instructions listed on http://www.springer.de/comp/lncs/authors.html for typesetting their manuscripts. These instructions are mandatory for the final papers.

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference/workshop that has proceedings. IACR reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced. For further details, see http://www.iacr.org/docs/.

For papers that are accepted, the length of the proceedings version will be at most 30 pages in the Springer LNCS format. The proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series and will be available at the conference. Authors of accepted papers must complete the IACR copyright assignment form available at http://www.iacr.org/docs/ for their work to be published in the proceedings. Authors of accepted papers must guarantee that their paper will be presented at the conference.

The Program Committee may select a paper for the best paper award.

* Schedule

Asiacrypt 2016 will operate a two-round review system with rebuttal phase. In the first round the program committee selects the submissions which are considered of value for proceeding to the second round, and the authors receive the first round notification with review comments. The authors of the selected submissions are invited to submit a text-based rebuttal letter to the review comments. In the second round the program committee further reviews the submissions by taking into account their rebuttal letter, and makes the final decision of acceptance or rejection.

The schedule is as follows:

Submission deadline: May 20, 2016, 2:00 a.m. UTC.
First round notification: July 10, 2016.
Rebuttals due: July 15, 2016.
Final notifications of acceptance or rejection: August 14, 2016.
Camera-ready version due: September 7, 2016.
Conference: Sunday December 4 to Thursday December 8, 2016.

* Stipends for Student Speakers

Students presenting a paper at ASIACRYPT 2016 will have a chance to get his or her registration fee waived. If you are a student speaker, please contact the General Chairs or Conference Secretariat before online registration. More details in Stipends.

* Stipends for Local Participants

We get some funds which allows us to waive/reduce the registration fee to support some local participants who would otherwise be unable to attend the conference. We particularly encourage applications for stipends from women and other under represented groups.

Related Resources

SEAS 2025   14th International Conference on Software Engineering and Applications
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSITEC 2025   11th International Conference on Computer Science, Information Technology
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICITA 2025   19th International Conference on Information Technology and Applications
SECRYPT 2025   22nd International Conference on Security and Cryptography
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
CLNLP 2025   2025 2nd International Conference on Computational Linguistics and Natural Language Processing
ADEIJ 2024   Advances in Engineering: an International Journal
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)