posted by user: ChickenRun || 3283 views || tracked by 10 users: [display]

TCC 2014 : Eleventh IACR Theory of Cryptography Conference


Conference Series : Theory of Cryptography Conference
When Feb 24, 2014 - Feb 26, 2014
Where San Diego, CA, USA
Submission Deadline Sep 3, 2013
Notification Due Nov 5, 2013
Final Version Due Dec 4, 2013

Call For Papers

Call for Papers in PDF: Found Here
Conference site:
Submission site:

The Eleventh Theory of Cryptography Conference will be held in San Diego, CA, USA, sponsored by the International Association for Cryptologic Research (IACR). Papers presenting original research on foundational and theoretical aspects of cryptography are sought. For more information about TCC, see the TCC manifesto.

The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them. More specifically, the scope of the conference includes, but is not limited to the:
Study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization,
Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones,
Formulation and treatment of new cryptographic problems,
Study of notions of security and relations among them,
Modeling and analysis of cryptographic algorithms, and
Study of the complexity assumptions used in cryptography.

The Theory of Cryptography Conference is dedicated to the dissemination of results within its scope. The conference aims to provide a meeting place for researchers and to be instrumental in shaping the identity of the theoretical cryptography community.

Instructions for authors: The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. It should contain a scholarly exposition of ideas, techniques, and results, including motivation and a clear comparison with related work. Submissions should be typeset with 11pt or larger font and reasonable spacing and margins. They should not exceed 12 letter-sized pages, not counting the title page, bibliography and appendices. Reviewers are not required to read appendices; the paper should be intelligible without them. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings; see the IACR policy on irregular submissions for more information. The evaluation process is not anonymous. Authors of accepted papers are expected to present their paper at the conference.

Submission instructions: Papers must be submitted electronically through the submission web page. Electronic submissions must conform to the procedure described in the submission server and must be received by the deadline indicated above. Electronic submission via the described interface is the only form of submission considered.

Best student paper award: This prize is for the best paper authored solely by students, where a student is a person that is considered a student by the respective institution at the time of the paper's submission. Eligibility must be indicated at the time of submission. The program committee may decline to make the award, or may split it among several papers.

Proceedings: Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science Series and will be available at the conference. Instructions for preparing the final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on December 4, 2013. This is a strict deadline, and authors should prepare accordingly.

Program Committee:
Amos Beimel (Ben-Gurion University)
Alexandra Boldyreva (Georgia Tech)
Kai-Min Chung (Academia Sinica)
Yevgeniy Dodis (New York University)
Nelly Fazio (City University of New York)
Marc Fischlin (Darmstadt University of Technology)
Jens Groth (University College London)
Iftach Haitner (Tel Aviv University)
Martin Hirt (ETH Zurich)
Dennis Hofheinz (Karlsruhe Institute of Technology)
Susan Hohenberger (Johns Hopkins University)
Eike Kiltz (Ruhr-Universität Bochum)
Eyal Kushilevitz (Technion - Israel Institute of Technology)
Yehuda Lindell - Chair (Bar-Ilan University)
Mohammad Mahmoody (Cornell University)
Claudio Orlandi (Aarhus University)
Chris Peikert (Georgia Tech)
Krzysztof Pietrzak (IST Austria)
Mike Rosulek (Oregon State University)
Adam Smith (Pennsylvania State University)
Salil Vadhan (Harvard University)
Vinod Vaikuntanathan University of Toronto)

Program Chair: Yehuda Lindell
General Chairs: Mihir Bellare, Daniele Micciancio

TCC Steering Committee Members: Mihir Bellare, Ivan Damgård, Shafi Goldwasser, Shai Halevi (chair), Russell Impagliazzo, Ueli Maurer, Silvio Micali, Moni Naor, and Tatsuaki Okamoto.

TCC web site:

Related Resources

ACNS 2020   18th International Conference on Applied Cryptography and Network Security
CRYPIS 2020   9th International Conference on Cryptography and Information Security
ICCSP--Ei Compendex and Scopus 2020   2020 4th International Conference on Cryptography, Security and Privacy (ICCSP 2020)--Ei Compendex and Scopus
CONCUR 2020   31st International Conference on Concurrency Theory
MLDM 2020   16th International Conference on Machine Learning and Data Mining MLDM 2020
LOPAL 2020   Second International Conference on Learning and Optimization Algorithms: Theory and Applications
SECRYPT 2020   17th International Conference on Security and Cryptography
IFIP SEC 2020   35th IFIP TC-11 SEC 2020 International Information Security and Privacy Conference
Usenix Security 2020   USENIX Security '20
SPTM 2020   8th International Conference of Security, Privacy and Trust Management