Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:

Cryptologic Track

* Foundations of Cryptography
* Provable Security
* Sequences and Boolean Functions
* Secure Multiparty Computation
* Symmetric Key Cryptosystems
* Public Key Cryptosystems
* Implementation of Cryptosystems
* Hash Functions and MACs
* Block Cipher Modes of Operation
* Key Management and Key Recovery
* Security Protocols and Their Analysis
* Information Hiding and Watermarking
* Secure computation outsourcing
* Functional computation and verifiable computation
* Obfuscation
* Leakage-resilient cryptography

Security Track

* Access Control
* Authentication and Authorization
* Biometric Security
* Distributed System Security
* Electronic Commerce Security
* Intrusion Detection
* Network Security
* Security Modeling and Architectures
* Intellectual Property Protection
* Mobile System Security
* Operating System Security
* Risk Evaluation and Security Certification
* Prevention and Detection of Malicious Codes
* Privacy-enhancing technologies
* Genomic privacy and SDN security
* Big data and cloud security

Instructions for Authors

The conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of keywords, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format. More information can be found at conference web site