CINXE.COM
Call for papers: IACR Communications in Cryptology
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"> <link href="/css/bootstrap/css/bootstrap.min.css" rel="stylesheet"> <script src="/css/bootstrap/js/bootstrap.bundle.min.js"></script> <title>Call for papers: IACR Communications in Cryptology</title> <link rel="stylesheet" href="/css/iacrcc.css"> <link rel="icon" type="image/png" href="/favicon.ico"> <style> .customCard { border-radius: 5px; border: 1px solid #9CBCEB; margin-bottom: 2rem; } .customCardTitle { padding: 1rem; background-color: #266DD3; color: #f3f3f3; font-size: 1.15rem; } .customCardRow { padding: 0.8rem 1rem; } .dateTitle { margin-top: 0.1rem; margin-bottom: 0; } .customCardRow p { margin-bottom: 0; } .customCardBody { padding: 1rem; } code { color: #010806; } </style> </head> <body> <noscript> <h1 class="text-center">What a lovely hat</h1> <h4 class="text-center">Is it made out of <a href="https://iacr.org/tinfoil.html">tin foil</a>?</h4> </noscript> <div class="pageTop d-flex justify-content-md-around justify-content-between align-items-center"> <a href="https://iacr.org"><img id="logo" class="d-none d-lg-block ms-5" src="/images/iacrlogo_small.png" title="International Association for Cryptologic Research" alt="IACR logo"></a> <span class="headerTitle d-none d-md-block">Communications in Cryptology</span> <span class="headerTitle d-md-none">IACR CiC</span> <div class="dropdown ps-lg-2 me-5"> <button class="btn border-0" type="button" id="dropdownMenuButton1" data-bs-toggle="dropdown" aria-expanded="true"> <img src="/images/search.svg" class="searchIcon" alt="Search Button" style="width:33px;"> </button> <div id="searchDd" class="dropdown-menu dropdown-menu-end bg-transparent border-0" aria-labelledby="dropdownMenuButton1" data-bs-popper="none"> <form action="/search" method="GET" class="me-3"> <div class="input-group"> <input id="searchbox" name="q" type="search" class="form-control shadow-none" autocomplete="off" > <input type="hidden" name="d" value="/var/www/wsgi/cicjournal/webapp/search_index/xapian.db"> <button class="btn btn-outline-dark border border-dark input-group-append"> Search </button> </div> </form> <div id="results" class="bg-light"></div> </div> </div> </div> <nav id="sitenav" class="navbar navbar-expand-md"> <div class="container"> <button class="navbar-toggler" type="button" data-bs-toggle="collapse" data-bs-target="#collapseContent" aria-controls="collapseContent" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="collapse navbar-collapse" id="collapseContent"> <ul class="navbar-nav nav-fill w-100 justify-content-between"> <li class="nav-item"> <a class="nav-link active" aria-current="page" href="/">Home</a> </li> <li class="nav-item"> <a class="nav-link" href="/contents">Papers</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" role="button" data-bs-toggle="dropdown" aria-expanded="false"> Submissions </a> <ul class="dropdown-menu ms-3 ms-lg-5"> <li><a class="dropdown-item" href="/callforpapers">Call for papers</a></li> <li><a class="dropdown-item" href="/ethics">Publication ethics</a></li> <li><a class="dropdown-item" href="/irregular">Irregular submissions</a></li> <li><a class="dropdown-item" href="/conflicts">Conflict of interest</a></li> <li><a class="dropdown-item" href="/retraction">Retraction policy</a></li> </ul> </li> <li class="nav-item"> <a class="nav-link" href="/faq">FAQ</a> </li> <li class="nav-item"> <a class="nav-link" href="/contact">Contact</a> </li> <li class="nav-item"> <a class="nav-link" href="/board">Editorial board</a> </li> <li class="nav-item dropdown"> <a href="#" class="ms-md-5 nav-link dropdown-toggle" data-bs-toggle="dropdown"><img alt="Login" src="/images/user.svg"></a> <ul class="dropdown-menu"> <li><a href="/login" class="dropdown-item">Admin login</a></li> </ul> </li> </ul> </div> </div> </nav> <main id="mainContent" class="container"> <h2>Call for papers: IACR Communications in Cryptology</h2> <p class="text-center"> <a class="btn coolButton fs-5" href="https://submit.iacr.org/cic2025_2">Submit a paper to Volume 2, Issue 2</a> </p> <p> Communications in Cryptology is a journal for original research papers which welcomes submissions on any topic in cryptology. This covers all research topics in cryptography and cryptanalysis, including but not limited to </p> <ul> <li>foundational theory and mathematics</li> <li>the design, proposal, and analysis of cryptographic primitives and protocols</li> <li>secure implementation and optimization in hardware or software</li> <li>real-world aspects of cryptography and its general application</li> </ul> <p> The CiC accepts original research works, and also invites submission of survey and historical articles on the above topics. However, the CiC does not accept "full versions" of work that is already formally published (which excludes the IACR eprint and similar archives). </p> <div class="row"> <div class="col-md-10 col-lg-7"> <article class="customCard"> <h4 class="customCardTitle"> Important Dates for CiC Volume 2, Issue 2 </h4> <div class="customCardRow row"> <h5 class="dateTitle col-5 col-md-6 col-lg-5"> <small>Monday</small><br>April 7, 2025 </h5> <p class="col-7 col-md-6 col-lg-7"> Submission deadline, at 11:59pm Anywhere on Earth (AoE) </p> </div> <div class="customCardRow row"> <h5 class="dateTitle col-5 col-md-6 col-lg-5"> <small>Monday - Friday</small><br>May 12-16, 2025 </h5> <p class="col-7 col-md-6 col-lg-7"> Rebuttal phase </p> </div> <div class="customCardRow row"> <h5 class="dateTitle col-5 col-md-6 col-lg-5"> <small>Tuesday</small><br>June 3, 2025 </h5> <p class="col-7 col-md-6 col-lg-7"> Notification </p> </div> <div class="customCardRow row"> <h5 class="dateTitle col-5 col-md-6 col-lg-5"> <small>Thursday</small><br>July 3, 2025 </h5> <p class="col-7 col-md-6 col-lg-7"> Final version due </p> </div> </article> </div> <section class="col-lg-5"> <p> Submissions must be written in English and be anonymous, with no author names, affiliations, acknowledgments, or obvious references. They must begin with a title, a short abstract, and a list of keywords. The introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. </p> <p> Submissions must be typeset using the iacrcc LaTeX class, <a href="https://publish.iacr.org/iacrcc">available here</a> using <span style="font-family:monospace;"> \documentclass[version=submission]{iacrcc}</span>. The <a href="https://publish.iacr.org/iacrcc">class webpage</a> provides documentation and a template how to use this class. The initial submission must be submitted electronically in PDF format, but the LaTeX source must be submitted for the final version. </p> </section> </div> <p> The page limit for regular papers is 20 pages excluding bibliography. Authors are encouraged to include supplementary material that can assist reviewers in verifying the validity of the results at the end of the paper. Supplementary material that does not require extra reviewing effort (such as test values, source code, or charts) will be published with the paper, but is not included in the page count. However, material that requires careful reviewing (such as proofs of the main theorems) will be included in the page count, even if it is put in the supplementary material or an appendix. </p> <p> If authors believe that more details are essential to substantiate the claims of their paper or to provide proofs, they can submit a longer paper (with no page limit); this should be indicated in the submission process by choosing the option “long paper”. For long papers of up to 40 pages, the decision may be deferred to the next round at the discretion of the Editors-in-Chief to allow for sufficient time to carefully review the work. For papers longer than 40 pages, the first round of review may be dedicated only to evaluating whether the length of the papers is justified by the scientific contribution. Moreover, the decision may be deferred by one or more rounds at the discretion of the Editors-in-Chief.</p> <p> Submissions must not substantially duplicate published work or work that has been submitted in parallel to any other journal or conference/workshop with published proceedings, and cannot be submitted to any other venue before the notification date. Accepted submissions may not appear in any other conference or workshop that has proceedings. The IACR reserves the right to share information about submissions with other program committees to detect parallel submissions and the <a href="/irregular">CiC Policy on Irregular Submissions</a> will be strictly enforced. Making a preprint available online, for example via the <a href="https://eprint.iacr.org/">IACR ePrint archive</a>, is not considered a prior publication in this context. </p> <p> Submitting authors must follow the CiC publication ethics and duties for authors <a href="/ethics">as explained here</a>. </p> <p> Submissions not meeting these guidelines risk rejection without consideration of their merits. </p> <h4 class="mt-4">Conflicts of Interest</h4> <p> Authors and Editorial Board members must follow the CiC Conflicts of Interest policy <a href="/conflicts">available here</a>. </p> <p> It is the responsibility of all authors to ensure correct reporting of CoI information. Submissions with incorrect or incomplete CoI information may be rejected without consideration of their merits. </p> <h2>Areas</h2> <p> There are six areas defined for the 2024 issues, each with their own chair. In case you do not find any area for your paper choose the one you consider nearest or contact the Editors-in-Chief. </p> <div class="row"> <div class="col-12 col-md-6 col-lg-4"> <div class="customCard"> <div class="customCardTitle">Public-Key Cryptology<br/>(chair: Michael Naehrig)</div> <div class="customCardBody"> <p> Design and analysis of all aspects of public-key cryptography. This includes classic or post-quantum public-key cryptographic schemes, the cryptanalysis of underlying hardness assumptions against conventional and quantum adversaries, as well as security proofs considering conventional and quantum adversaries. </p> </div> </div> </div> <div class="col-12 col-md-6 col-lg-4"> <div class="customCard"> <div class="customCardTitle">Symmetric-Key Cryptology<br/>(chair: Yu Sasaki)</div> <div class="customCardBody"> <p> Design and analysis of all aspects of symmetric cryptography: this includes block ciphers, stream ciphers, encryption schemes, hash functions, message authentication codes, cryptographic permutations and authenticated encryption schemes as well as cryptanalysis and security proofs considering conventional and quantum adversaries. </p> </div> </div> </div> <div class="col-12 col-md-6 col-lg-4"> <div class="customCard"> <div class="customCardTitle">Theoretical Foundations<br/>(chair: Kai-Min Chung)</div> <div class="customCardBody"> <p> Paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural and fundamental cryptographic problems, including the study of known paradigms and the discovery of new ones, the formulation of new cryptographic problems, the study of information-theoretic concepts relevant to cryptology, and the complexity-theoretic study of hardness assumptions. </p> </div> </div> </div> <div class="col-12 col-md-6 col-lg-4"> <div class="customCard"> <div class="customCardTitle">Cryptographic Engineering<br/>(chair: Amir Moradi)</div> <div class="customCardBody"> <p> The design, optimization and analysis of hardware and software implementations of (advanced) cryptographic approaches and research in cryptographic engineering. This includes the study of practical attacks against implementations, including side-channel attacks, fault attacks, and micro-architectural attacks, as well as countermeasures and formal verification of any of the aforementioned techniques. </p> </div> </div> </div> <div class="col-12 col-md-6 col-lg-4"> <div class="customCard"> <div class="customCardTitle">Advanced Primitives<br/>(chair: Nigel P. Smart)</div> <div class="customCardBody"> <p> The design and study of advanced cryptographic concepts: this includes homomorphic encryption, multi-party computation, functional encryption and (hierarchical) identity based encryption schemes, similarly enriched signature schemes, obfuscation and multilinear maps. </p> </div> </div> </div> <div class="col-12 col-md-6 col-lg-4"> <div class="customCard"> <div class="customCardTitle">Real World Attacks & Applications<br/>(chair: Chitchanok Chuengsatiansup)</div> <div class="customCardBody"> <p> The design of cryptographic solutions to real-world use-cases and their cryptanalysis. This includes (but is not limited to) cryptographic real-world protocols such as secure communication protocols, voting protocols, or secure messaging, as well as real world applications of advanced primitives like MPC or FHE, where one could present models to formalize security of such protocols, security proofs, and tools to verify their security as well as attacks on real-world deployed systems, from hacking cars to cold-boot attacks to downgrade attacks. </p> </div> </div> </div> </div> </main> <div class="container-fluid mt-auto" id="pageFooter"> </div> <footer class="text-center footer py-3"> <small> <a href="https://iacr.org/copyright.html">Copyright © 2025</a> <span class="d-none d-md-inline">by the </span><span class="d-md-none">IACR</span> <span class="d-none d-md-inline">International Association for Cryptologic Research</span> <span class="d-none d-md-inline">• </span><br class="d-md-none"> <a href="https://iacr.org/privacy.html">Privacy Policy</a> </small> </footer> <script id="results-template" type="text/x-handlebars-template"> <div class="p-3 shadow" style="margin-bottom:1rem;max-height:70vh;overflow-y:scroll"> <p>{{estimated_results}} results (if more than 100, then refine your query)</p> <ol> {{#each results}} <li role="presentation"><a href="{{url}}">{{title}}</a><br> {{#each authors }}{{this}}{{#unless @last}}, {{/unless}}{{/each}}</li> {{/each}} </ol> </div> </script> <script src="/static/js/handlebars-v4.7.7.js"></script> <script> var theTemplateScript = document.getElementById('results-template').innerHTML; var resultsTemplate = Handlebars.compile(theTemplateScript); var textinput = document.getElementById('searchbox'); // Returns a function, that, as long as it continues to be invoked, will not // be triggered. The function will be called after it stops being called for // N milliseconds. If `immediate` is passed, trigger the function on the // leading edge, instead of the trailing. function debounce(func, wait, immediate) { var timeout; return function() { var context = this, args = arguments; var later = function() { timeout = null; if (!immediate) func.apply(context, args); }; var callNow = immediate && !timeout; clearTimeout(timeout); timeout = setTimeout(later, wait); if (callNow) func.apply(context, args); }; }; let controller; let signal; var doSearch = debounce(function() { args = {'d': '/var/www/wsgi/cicjournal/webapp/search_index/xapian.db'} if (textinput.value) { args['q'] = textinput.value; if (controller !== undefined) { console.log('killing'); controller.abort(); } controller = new AbortController(); signal = controller.signal; let search_url = "https://cic.iacr.org/api/search" + "?" + new URLSearchParams(args); console.log(search_url); fetch(search_url, {signal}) .then((response) => response.json()) .then((data) => { console.log(data); let elem = document.getElementById('view'); if (elem) {elem.innerHTML = '';} if (data.results.length > 0) { document.getElementById('results').innerHTML = resultsTemplate(data); } else { document.getElementById('results').innerHTML = '<div class="p-3 shadow">no results</div>'; } controller = undefined; }).catch((error) => { console.log('error in fetch'); console.log(error); }); } else { console.log('no query'); } }, 500); // only after 250 ms. document.querySelectorAll('input').forEach((elem) => { elem.addEventListener('input', doSearch); }); </script> </body> </html>