posted by user: ChickenRun || 6025 views || tracked by 10 users: [display]

TCC 2014 : Eleventh IACR Theory of Cryptography Conference

FacebookTwitterLinkedInGoogle


Conference Series : Theory of Cryptography Conference
 
Link: http://www.iacr.org/workshops/tcc2014/call_for_papers.html
 
When Feb 24, 2014 - Feb 26, 2014
Where San Diego, CA, USA
Submission Deadline Sep 3, 2013
Notification Due Nov 5, 2013
Final Version Due Dec 4, 2013
 

Call For Papers

Call for Papers in PDF: Found Here
Conference site: http://www.iacr.org/workshops/tcc2014
Submission site: https://secure.iacr.org/websubrev/tcc2014/submit/

The Eleventh Theory of Cryptography Conference will be held in San Diego, CA, USA, sponsored by the International Association for Cryptologic Research (IACR). Papers presenting original research on foundational and theoretical aspects of cryptography are sought. For more information about TCC, see the TCC manifesto.

The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them. More specifically, the scope of the conference includes, but is not limited to the:
Study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization,
Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones,
Formulation and treatment of new cryptographic problems,
Study of notions of security and relations among them,
Modeling and analysis of cryptographic algorithms, and
Study of the complexity assumptions used in cryptography.

The Theory of Cryptography Conference is dedicated to the dissemination of results within its scope. The conference aims to provide a meeting place for researchers and to be instrumental in shaping the identity of the theoretical cryptography community.

Instructions for authors: The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. It should contain a scholarly exposition of ideas, techniques, and results, including motivation and a clear comparison with related work. Submissions should be typeset with 11pt or larger font and reasonable spacing and margins. They should not exceed 12 letter-sized pages, not counting the title page, bibliography and appendices. Reviewers are not required to read appendices; the paper should be intelligible without them. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings; see the IACR policy on irregular submissions for more information. The evaluation process is not anonymous. Authors of accepted papers are expected to present their paper at the conference.

Submission instructions: Papers must be submitted electronically through the submission web page. Electronic submissions must conform to the procedure described in the submission server and must be received by the deadline indicated above. Electronic submission via the described interface is the only form of submission considered.

Best student paper award: This prize is for the best paper authored solely by students, where a student is a person that is considered a student by the respective institution at the time of the paper's submission. Eligibility must be indicated at the time of submission. The program committee may decline to make the award, or may split it among several papers.

Proceedings: Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science Series and will be available at the conference. Instructions for preparing the final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on December 4, 2013. This is a strict deadline, and authors should prepare accordingly.

Program Committee:
Amos Beimel (Ben-Gurion University)
Alexandra Boldyreva (Georgia Tech)
Kai-Min Chung (Academia Sinica)
Yevgeniy Dodis (New York University)
Nelly Fazio (City University of New York)
Marc Fischlin (Darmstadt University of Technology)
Jens Groth (University College London)
Iftach Haitner (Tel Aviv University)
Martin Hirt (ETH Zurich)
Dennis Hofheinz (Karlsruhe Institute of Technology)
Susan Hohenberger (Johns Hopkins University)
Eike Kiltz (Ruhr-Universität Bochum)
Eyal Kushilevitz (Technion - Israel Institute of Technology)
Yehuda Lindell - Chair (Bar-Ilan University)
Mohammad Mahmoody (Cornell University)
Claudio Orlandi (Aarhus University)
Chris Peikert (Georgia Tech)
Krzysztof Pietrzak (IST Austria)
Mike Rosulek (Oregon State University)
Adam Smith (Pennsylvania State University)
Salil Vadhan (Harvard University)
Vinod Vaikuntanathan University of Toronto)

Program Chair: Yehuda Lindell
General Chairs: Mihir Bellare, Daniele Micciancio

TCC Steering Committee Members: Mihir Bellare, Ivan Damgård, Shafi Goldwasser, Shai Halevi (chair), Russell Impagliazzo, Ueli Maurer, Silvio Micali, Moni Naor, and Tatsuaki Okamoto.

TCC web site: http://www.iacr.org/workshops/tcc/

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SEAS 2025   14th International Conference on Software Engineering and Applications
VISAPP 2025   20th International Conference on Computer Vision Theory and Applications
SECRYPT 2025   22nd International Conference on Security and Cryptography
IJCIS 2024   International Journal on Cryptography and Information Security
CLNLP 2025   2025 2nd International Conference on Computational Linguistics and Natural Language Processing
COLT 2025   Conference on Learning Theory
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
SI VMNP 2025   SPECIAL ISSUE on Variational Methods and Nonlinear PDEs
CSP 2025   2025 9th International Conference on Cryptography, Security and Privacy (CSP 2025)