The call for papers is also available in PDF.
Original contributions on all technical aspects of cryptology are solicited for submission to Crypto 2017, the 37th Annual International Cryptology Conference. Submissions are welcome on any cryptographic topics including, but not limited to:
Crypto 2017 is sponsored by the International Association for Cryptologic Research (IACR), in co-operation with the Computer Science Department of the University of California, Santa Barbara. The proceedings of Crypto 2017 will be published by Springer in the LNCS series.
Feb 9 2017 (22:00 UTC)
Submission deadline --Extended to 22:00 from 3:00---.
May 8 2017
Notification of decision:
June 5 2017
Proceedings version due:
Aug 20-24 2017
Conference:
Submissions must use the Springer LNCS format with the default margins and font, and may contain at most 30 pages including the title page, bibliography, and figures. Optionally, any amount of clearly marked supplementary material may be supplied, following after the main body of the paper or in separate files; however, reviewers are not required to read or review any supplementary material, and submissions are expected to be intelligible and complete without it. The final published version of an accepted paper is expected to closely match the reviewed portion of the submission.
Submissions should begin with a title and abstract, followed by an introduction that summarizes the paper's contribution in a manner that is understandable to a general cryptographic audience. Submissions must be anonymous, with no author names, affiliations, or obvious references; all submissions will be blind-refereed. Submissions must not substantially duplicate published work or work that has been submitted in parallel to any other journal or conference/workshop with published proceedings. All submissions to Crypto 2017 are viewed as active submissions throughout the entire review period, and may not be submitted to any other journal or conference/workshop with published proceedings before the notification date. Accepted submissions cannot appear in any other conference or workshop that has published proceedings. The IACR reserves the right to share information about submissions with other program committees to check for violations of these rules. The conference will follow the IACR Policy on Irregular Submissions available at https:/www.iacr.org/docs/ ; authors may wish to consult the IACR Guidelines for Authors available there as well. Submissions not meeting all the stated guidelines may be rejected without consideration of their merits.
Papers must be submitted electronically; a detailed description of the submission procedure will be available on the conference webpage. All accepted papers must conform to the Springer publishing requirements, and authors will be required to sign the IACR copyright and consent form available at https:/www.iacr.org/docs/ when submitting the proceedings version of their paper. By submitting a paper, the authors agree that if the paper is accepted, one of the authors will present the paper at the conference and, in addition, will grant permission to the IACR to distribute the presentation slides as well as an audio/video recording of the presentation as per the IACR copyright and consent form.
The Program Committee may choose one or more papers to receive a "Best Paper" award, and may also choose to award a prize for the best paper authored exclusively by young researchers (i.e., researchers who have not received a PhD by August 2014). As usual, awards will only be given if deserving papers are identified.
The IACR's Cryptography Research Fund allows us to waive the registration fee for all student presenters of an accepted paper. A limited number of stipends will also be available to students unable to obtain funding to attend the conference. Students in under-represented groups are especially encouraged to apply. Requests for waivers and/or stipends should be addressed to the General Chair and not to the Program Chairs.
NTT Secure Platform Laboratories
IIT Madras
The Academic College of Tel Aviv-Yaffo
KU Leuven
UC San Diego
Stanford University
IDC Herzliya
Boston University/Tel Aviv University
Seoul National University
University of Maryland
Aarhus University
UC Berkeley
University of Haifa
NTT Secure Platform Laboratories
University of Waterloo
Carnegie Mellon University
Johns Hopkins University
University of Pennsylvania
Florida State University
Karlsruhe Institute of Technology
Université de Picardie
Nagoya University
Brown University
Inria
UC Santa Barbara
Bauhaus-Universität Weimar
IBM Zurich
University of Virginia
Visa Research
Aarhus University
University of Bristol
Cornell University
TargetProof LLC
U. Amsterdam/CWI/QuSoft
Hebrew University
ANSSI
McMaster University
UC Santa Barbara
NTT Secure Platform Laboratories
Tel Aviv University/Columbia University
University of Tartu
Rensselaer Polytechnic Institute