posted by user: tohki || 185 views || tracked by 3 users: [display]

CANS 2025 : Cryptology and Network Security

FacebookTwitterLinkedInGoogle


Conference Series : Cryptology and Network Security
 
Link: https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html
 
When Nov 17, 2025 - Nov 20, 2025
Where Osaka,Japan
Submission Deadline Apr 17, 2025
Notification Due Jul 10, 2025
Final Version Due Aug 14, 2025
Categories    security   cryptography   network
 

Call For Papers

The 24th International Conference on Cryptology and Network Security
(CANS 2025)
https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html
17th - 20th November 2025, Osaka, Japan

Program Committee Chairs

Mehdi Tibouchi Nippon Telegraph and Telephone Corporation
Yongdae Kim Korea Advanced Institute of Science and Technology


About the conference

The International Conference on Cryptology and Network Security (CANS)
is a premier forum for presenting research in the field of cryptology
and network security. The conference seeks academic, industry, and
government submissions on all theoretical and practical aspects of
cryptology and network security. This year marks the 24th iteration of
the conference and will be held at Osaka, Japan. Proceedings of this
year's conference will be published by Springer LNCS; proceedings of
previous iterations of the conference can be found online.

Submission guidelines

High quality papers on unpublished research and implementation
experiences may be submitted. All papers must be original and not
substantially duplicate work that has been published at, or is
simultaneously submitted to, a journal or another conference or workshop
with proceedings. All submissions must be written in English and span no
more than 20 pages in the Springer’s Lecture Notes in Computer Science
(LNCS) format, including title, abstract, and bibliography. The
introduction should summarize the contributions of the paper at a level
understandable by a non-expert reader and explain the context to related
work.
Submitted papers may contain supplementary material in the form of
well-marked appendices or a separate file archive (particularly for
source code, data files, etc.). Note that supplementary material will
not be included in the proceedings. Moreover, the main paper should be
intelligible without requiring the reader to consult the supplementary
material; the reviewers may optionally refer to the supplementary
material, but are also permitted to base their assessment on the main
paper alone.

Submissions must be anonymous (no author names, affiliations,
acknowledgments, or obvious references). The conference will also
consider short papers of up to eight pages in the LNCS format, excluding
the bibliography (max 2 pages), for results that are not yet fully
fleshed out or that simply require fewer pages to describe but still
make a significant contribution.
All submissions must be processed with LaTeX2e according to the
instructions given by Springer. Submitted manuscripts must be typeset in
plain Springer LNCS format, in particular without changing the font
size, margins or line spacing. Submissions not meeting these guidelines
may be rejected without consideration of their merits.
Papers must be submitted via EasyChair. The deadline for submissions is
17 April anywhere on earth (AoE).

Important dates
Submission: 17 April AoE. Papers must be submitted via EasyChair.
Notification: 10 July
Camera-ready: 14 August
Conference: 17–20 November

Presentation requirements
At least one author of every accepted paper must register and pay the
full registration fee (non-student) for the conference by the early
registration deadline indicated by the organizers. Papers without a
registered author will be removed from the sessions. Authors must
present their own paper(s). Session proceedings, including all accepted
papers, will be published in LNCS and will be available at the
conference.

Topic areas
Access Control
Anonymity and Censorship Resistance
Applied Cryptography
Biometrics
Block Ciphers & Stream Ciphers
Blockchain/Cryptocurrency Security and Privacy
Confidential Computing
Cryptographic Algorithms and Primitives
Cryptographic Protocols
Cyber Attack (DDoS, Botnets, APTs) prevention, detection and response
Cyber-crime defense and forensics
Data and Application Security
Denial of Service Protection
Data and Computation Integrity
Edge/Fog Computing Security and Privacy
Embedded System Security
Formal Methods for Security and Privacy
Hash Functions
Identity Management and Privacy
IoT (e.g., smart homes, IoT, body-area networks, VANETs) Security
Key Management
Location Based Services Security and Privacy
Malware Analysis, Detection and Prevention
Machine Learning for Security
Network protocol (routing, management) security
Online Social Networks Security and Privacy
Peer-to-Peer Security and Privacy
Post-Quantum Cryptography and Cryptanalysis
Privacy and anonymity in networks and distributed systems
Privacy-Enhancing Technologies
Public-Key Cryptography and Cryptanalysis
Security for Cloud/Edge computing
Security for cyber-physical systems (e.g., autonomous vehicles,
industrial control systems)
Security and Privacy of ML and AI-Based Systems
Security and Resilient Solutions for Critical Infrastructures (e.g.,
electronic voting, smart grid)
Security Architectures
Security in Content Delivery
Security Models
Secure Multi-Party Computation
Secure Distributed Computing
Side-Channel Attacks and Countermeasures
Trust Management
Usable Security
Virtual Private Networks
Web Security (incl. social networking, crowd-sourcing, fake
news/disinformation)Wireless and Mobile Security
Zero-Knowledge Proofs

Related Resources

CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
DSA 2025   The 12th International Conference on Dependability Systems and Their Applications
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
SECRYPT 2025   22nd International Conference on Security and Cryptography
CSF 2025   38th IEEE Computer Security Foundations Symposium - deadline 3
ISKE 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
IEEE CSR 2025   2025 IEEE International Conference on Cyber Security and Resilience