
3月23日 - 2026年3月26日
Cryptographers Track at RSA Conference
まだフォロワーがいません。
トピック:
概要
Original papers on all technical aspects of cryptology are solicited for submission. Papers of interest to the wider audience of security professionals at RSAC Conference are especially encouraged. Topics include but are not limited to: Blockchains and distributed ledger security, Code based cryptography, Cryptanalysis, Cryptographic standards, Design and security analysis of cryptographic primitives and protocols, Differential privacy, Formal verification of cryptographic security properties, Hardware & software implementations, Indistinguishable obfuscation, Information-theoretic cryptography, Multi-party computation and zero-knowledge, Novel applications of cryptography, Physically unclonable functions, Post-quantum cryptography, Privacy, Public-key cryptography algorithms and protocols, Public-key encryption and advanced encryption schemes, Side-channel attacks and defenses, Symmetric-key cryptography, Theory of leakage resistance, Time-released cryptography and PoW, White-box cryptography. We also welcome systematization of knowledge (SoK) papers. These papers will not be judged on novel research contributions, but on their value to the research community. SoK papers should provide an important new viewpoint on an established, major research area; support or challenge long-held beliefs in such an area with compelling evidence; or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate for acceptance. If you decide to submit such a paper, please put “SoK:” in the title. For submissions including practical evaluations, it is encouraged (but not required) to make implementations available to facilitate replicability and reproducibility. Accepted papers (including SoK papers) will appear in the CT-RSA proceedings, published by Springer in its LNCS series. CT-RSA is scheduled to be an in-person event. One of the things that makes CT-RSA special is the interaction between academia and industry. For that reason, it is strongly preferred that authors of accepted papers present their work in-person. Exceptions will be made only in the case of serious extenuating circumstances, such as visa delays, and other emergencies. The presenter of each paper will be given a free Full Pass to RSAC Conference.
論文募集
Original papers on all technical aspects of cryptology are solicited for submission. Papers of interest to the wider audience of security professionals at RSAC Conference are especially encouraged. Topics include but are not limited to: Blockchains and distributed ledger security, Code based cryptography, Cryptanalysis, Cryptographic standards, Design and security analysis of cryptographic primitives and protocols, Differential privacy, Formal verification of cryptographic security properties, Hardware & software implementations, Indistinguishable obfuscation, Information-theoretic cryptography, Multi-party computation and zero-knowledge, Novel applications of cryptography, Physically unclonable functions, Post-quantum cryptography, Privacy, Public-key cryptography algorithms and protocols, Public-key encryption and advanced encryption schemes, Side-channel attacks and defenses, Symmetric-key cryptography, Theory of leakage resistance, Time-released cryptography and PoW, White-box cryptography. We also welcome systematization of knowledge (SoK) papers. These papers will not be judged on novel research contributions, but on their value to the research community. SoK papers should provide an important new viewpoint on an established, major research area; support or challenge long-held beliefs in such an area with compelling evidence; or present a convincing, comprehensive new taxonomy of such an area. Survey papers without such insights are not appropriate for acceptance. If you decide to submit such a paper, please put “SoK:” in the title. For submissions including practical evaluations, it is encouraged (but not required) to make implementations available to facilitate replicability and reproducibility. Accepted papers (including SoK papers) will appear in the CT-RSA proceedings, published by Springer in its LNCS series. CT-RSA is scheduled to be an in-person event. One of the things that makes CT-RSA special is the interaction between academia and industry. For that reason, it is strongly preferred that authors of accepted papers present their work in-person. Exceptions will be made only in the case of serious extenuating circumstances, such as visa delays, and other emergencies. The presenter of each paper will be given a free Full Pass to RSAC Conference.
重要な日付
カンファレンス日程
Conference Date
2026年3月23日 → 2026年3月26日
- 2025年5月1日
- 2025年4月28日 - 2025年5月1日
情報源ランク
情報源: CORE2023
ランク: B
研究分野: Cybersecurity and privacy, 使用されていません