posted by organizer: kenobicjj || 7039 views || tracked by 3 users: [display]

MyCRYPT 2016 : The International Conference on Cryptology & Malicious Security hosted in Malaysia

FacebookTwitterLinkedInGoogle

Link: https://foe.mmu.edu.my/mycrypt2016/?page_id=2
 
When Dec 1, 2016 - Dec 2, 2016
Where Kuala Lumpur, Malaysia
Submission Deadline Apr 30, 2016
Notification Due Jul 10, 2016
Final Version Due Sep 1, 2016
Categories    cryptography   security   malicious security   cryptology
 

Call For Papers

General Information

Original papers of substantial technical contribution in the areas of cryptology and malicious security are solicited for submission to the International Conference on Cryptology & Malicious Security hosted in Malaysia (Mycrypt 2016).

Note that the first & only Mycrypt thus far was in 2005; even back then it had a dedicated session on unconventional cryptography. Since then, substantial breakthroughs have been made in crypto in the past decade, including notions pertaining to malicious security, i.e. where security is no longer just against bad guys but where good guys who are conventionally viewed as mostly defensive can equally be adversarial. It is now time to rejuvenate the series with particular focus on paradigm-shifting crypto research & thinking outside the current box.

Submissions to Mycrypt 2016 should be aimed towards the following topic categories:

paradigm-shifting, unconventional cryptology (e.g. malicious crypto, unconventional formulations of underlying problems, or new hard problems)
position papers on breakthrough cryptologic/security research
revisits/critiques/analysis of long-standing crypto paradigms/approaches/models/formulations (in fact, we also encourage paired submissions by crypto factions of opposing views, where each paper in the pair argues for/against a paradigm)
approaches/solutions to long-standing open problems; or formulations of long-standing/thus-far adhoc security approaches
analysis of crypto/security standardization processes & how they may be subverted
cryptofications of the real world (e.g. new types of adversarial models and/or notions inspired by real world incidences/problems, modelling humans-in-the-security-loop)
crypto & beyond: cryptologic techniques in union with techniques from other disciplines
Other aspects of cryptology including conventional cryptology are welcome provided they make substantial contributions to the field of cryptology, to how the world views crypto or how crypto views the world. The gist is that we welcome all things non-conventional & paradigm-shifting.

Instructions for Authors

The submissions must be anonymous with no obvious references.
Submissions must be at most 20 pages excluding references and appendices, and maximally 30 pages in total; and be in 11pt fonts using Springer LNCS format with reasonable margins.

The main part of the paper should be intelligible as reviewers are not required to read the appendices. The introduction should summarize the main contributions of the paper so that it is understandable to a non-expert in cryptography.

Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The PC reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced.

Submissions not meeting these guidelines will be rejected without consideration of their merits.

Submitted papers must be in PDF format and should be submitted electronically via the submission server.

The reviewing process will involve two stages. Some papers will be rejected after stage 1, others will proceed to stage 2 and rebuttals will be requested from these authors. The rebuttals will be taken into consideration during the stage 2 of the PC discussion.

Proceedings

Mycrypt 2016 proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series, and will be available at the conference.
Authors of accepted papers must guarantee that their paper will be presented at the conference. The Mycrypt 2016 PC reserves the right to share information about misbehaving authors with other program committees.

Important dates

Submission deadline April 30, 2016 (23:59 UTC)
First round of comments July 10, 2016
Rebuttals due July 17, 2016
Notification of acceptance August 10, 2016
Camera ready version due September 1, 2016
Conference December 1 & 2, 2016


Program Chairs

Raphael C.-W. Phan
Multimedia University (MMU), Malaysia

Moti Yung
Google & Columbia University, USA

Related Resources

CEVVE 2024   2024 2nd International Conference on Electric Vehicle and Vehicle Engineering (CEVVE 2024)
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
CSW 2024   2024 3rd International Conference on Cyber Security
ICISS 2024   The 20th International Conference on Information Systems Security (ICISS-2024)
CRBL 2024   International Conference on Cryptography and Blockchain
NYC-2024-BC 2024   New York Annual Conference on Blockchain and Cryptography 2024
MAL-IoT 2024   9th International Workshop on Malicious Software and Hardware in the Internet of Things
ACIJ 2024   Advanced Computing: An International Journal
IOTCB 2024   3rd International Conference on IOT, Cloud and Big Data
USENIX Security 2025   The 34th USENIX Security Symposium - Cycle 2