2
CRYPTO The 34 th Ann Augu http://ww General Information Original contributions on all technical cryptology are solicited for submissio CRYPTO 2014, the 34th Annual Intern Cryptology Conference. This includes foundational, applied, and industry-re aspects of the discipline. Innovative, the box” papers are particularly solici CRYPTO 2014 is sponsored by the Int Association for Cryptologic Research cooperation with the Computer Scien Department of the University of Califo Santa Barbara. Important Dates Submission deadline: February 10, 2014 UTC (5:00 pm EST First round of comments: April 14, 2014 Responses to comments due: April 17, 2014 at 2 (6:00 pm EDT) Notification of decision: May 19, 2014 Proceedings version due: June 13, 2014 Conference: August 17-21, 20 Instructions for Authors Submissions must be at most 12 pag excluding references and appendices. must be in single-column format, use 11-point fonts, and have reasonable Submissions should begin with a title abstract, and a list of keywords. The introduction should summarize the pa contributions at a level understandab expert in the field. Reviewers are not read appendices, so papers should be without them. Submissions must be p O 2014 | Call for Papers nual International Cryptology Conference ust 17-21, 2014, Santa Barbara, CA ww.iacr.org/conferences/crypto2014/ l aspects of on to national s works on elated “outside ited. ternational (IACR), in nce ornia, 4 at 22:00 T) 22:00 UTC 014 ges, . The paper e at least margins. e, a short aper’s ble to a non- t required to e intelligible presented in a way that allows the under verification of the claimed resu reasonable time and effort. Submissions must be anonymo author names, affiliations, or o references. It is recognized tha information regarding the iden may become public outside the submission process. The PC wi external information. Submissions should be prepare and submitted in PDF format u (see this page for help). Paper submitted electronically; a det of the electronic submission pr provided on the conference ho Submissions must not substan work that any of the authors p submitted, or are planning to s notification date to any journa conference/workshop with pro Accepted submissions may not other conference or workshop proceedings. The program com information about submitted p conference chairs to ensure ad policy. Authors uncertain whet submission conforms to IACR p contact the program chairs. Th submitted papers guarantee th be presented at the conference authors if it is accepted. Submissions not meeting any above risk rejection without co their merits. Best Young Researcher P In a continuing effort to promote by young researchers, this year w have in addition to the general be rstanding and ults with ous, with no obvious at, at times, ntities of authors e paper ill ignore this ed using LaTeX using type-1 fonts rs must be tailed description rocedure will be omepage . ntially duplicate published, submit before the al or oceedings. t appear in any that has mmittee may share papers with other dherence to this ther their policy should he authors of hat their paper will e by one of the of the guidelines onsideration of Paper Award independent work we again plan to est paper award, a

CRYPTO 2014 | Call for Papers - International … Stevens CWI, The Netherlands Katsuyuki Takashima Mitsubishi Electric, Japan Stefano Tessaro UCSB, USA Vinod Vaikuntanathan MIT, USA

Embed Size (px)

Citation preview

CRYPTOThe 34

th Annual International Cryptology Conference

August 17

http://www.iacr.org/conferences/crypto2014/

General Information Original contributions on all technical aspects of cryptology are solicited for submission to CRYPTO 2014, the 34th Annual International Cryptology Conference. This includes foundational, applied, and industry-related aspects of the discipline. Innovative, the box” papers are particularly solicited. CRYPTO 2014 is sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the Computer Science Department of the University of California, Santa Barbara.

Important Dates

Submission deadline: February 10, 2014UTC (5:00 pm EST)

First round of

comments: April 14, 2014

Responses to

comments due:

April 17, 2014 at 2(6:00 pm EDT)

Notification of

decision: May 19, 2014

Proceedings version

due: June 13, 2014

Conference: August 17-21, 2014

Instructions for Authors Submissions must be at most 12 pages, excluding references and appendices. The paper must be in single-column format, use at least 11-point fonts, and have reasonable margins. Submissions should begin with a title, a short abstract, and a list of keywords. The introduction should summarize the papercontributions at a level understandable to a nonexpert in the field. Reviewers are not required to read appendices, so papers should be intelligible without them. Submissions must be presented

CRYPTO 2014 | Call for Papers Annual International Cryptology Conference

August 17-21, 2014, Santa Barbara, CA

http://www.iacr.org/conferences/crypto2014/

on all technical aspects of mission to

Annual International Cryptology Conference. This includes works on

related of the discipline. Innovative, “outside

ticularly solicited. is sponsored by the International

ation for Cryptologic Research (IACR), in cooperation with the Computer Science Department of the University of California,

4 at 22:00 :00 pm EST)

at 22:00 UTC

21, 2014

Submissions must be at most 12 pages, excluding references and appendices. The paper

column format, use at least point fonts, and have reasonable margins.

Submissions should begin with a title, a short abstract, and a list of keywords. The

paper’s contributions at a level understandable to a non-expert in the field. Reviewers are not required to read appendices, so papers should be intelligible without them. Submissions must be presented

in a way that allows the understandingverification of the claimed results with reasonable time and effort. Submissions must be anonymous,author names, affiliations, or obvious references. It is recognized that, at timesinformation regarding the identities of authors may become public outside the paper submission process. The PC will ignore this external information. Submissions should be prepared using LaTeX and submitted in PDF format using type(see this page for help). Papers must be submitted electronically; a detailed description of the electronic submission procedure will be provided on the conference homepageSubmissions must not substantiawork that any of the authors published, submitted, or are planning to submit before the notification date to any journal or conference/workshop with proceAccepted submissions may not appear in any other conference or workshop that hasproceedings. The program committee may share information about submitted papers with other conference chairs to ensure adherence to this policy. Authors uncertain whether their submission conforms to IACR pcontact the program chairs. The authors of submitted papers guarantee that their paper will be presented at the conferenceauthors if it is accepted. Submissions not meeting any of the guidelines above risk rejection without contheir merits.

Best Young Researcher Paper Award

In a continuing effort to promote independent work by young researchers, this year we have in addition to the general best paper award,

in a way that allows the understanding and verification of the claimed results with

Submissions must be anonymous, with no author names, affiliations, or obvious

ed that, at times, information regarding the identities of authors

ic outside the paper submission process. The PC will ignore this

red using LaTeX using type-1 fonts

for help). Papers must be submitted electronically; a detailed description of the electronic submission procedure will be

conference homepage. Submissions must not substantially duplicate work that any of the authors published, submitted, or are planning to submit before the notification date to any journal or conference/workshop with proceedings.

not appear in any other conference or workshop that has proceedings. The program committee may share information about submitted papers with other conference chairs to ensure adherence to this policy. Authors uncertain whether their

IACR policy should contact the program chairs. The authors of submitted papers guarantee that their paper will be presented at the conference by one of the

Submissions not meeting any of the guidelines above risk rejection without consideration of

Best Young Researcher Paper Award

effort to promote independent work by young researchers, this year we again plan to

general best paper award, a

prize for the best paper that is authored exclusively by young researchers. To be eligible, all co-authors must be either full-time students or have received their PhD degree in 2012 or later. As usual, awards will be given only if deserving papers are identified.

Interim Reviews and Rebuttal

Authors will be given the opportunity to comment on the initial reviews written on their submissions. Commenting is optional; it is not a requirement. The dates are listed above. Additional details regarding the format and exact procedure will be available at the conference homepage.

Proceedings

Proceedings will be published in Springer’s Lecture Notes in Computer Science series, and will be available at the conference, either physically or electronically. Instructions for the preparation of the proceedings version will be sent to the authors of accepted papers. Authors will need to provide a signed IACR Copyright form along with the proceedings version of their papers.

Stipends

A limited number of stipends will be available to those unable to obtain funding to attend the conference, and to students having an accepted paper that they will present. Requests for stipends should be addressed to the general chair.

Contact Information

General Chair:

Alexandra Boldyreva Klaus Advanced Computing Georgia Institute of Technology 266 Ferst Dr. Atlanta, GA 30332-0765, USA Tel: +1 404 385 6753 Email: [email protected]

Program Co-Chairs:

Juan A. Garay Yahoo Labs 701 First Ave. Sunnyvale, CA 94089, USA Rosario Gennaro The City College of New York 160 Convent Avenue New York, NY 10031, USA

Email: [email protected]

Advisory Member

Ran Canetti Boston U., USA and Tel-Aviv U., Israel CRYPTO 2013 Program Co-Chair

Program Committee

Yevgeniy Dodis NYU, USA

Orr Dunkelman U. of Haifa, Israel

Serge Fehr CWI, The Netherlands

Pierre-Alain Fouque U. Rennes 1, France

Craig Gentry IBM Research, USA

Vipul Goyal MSR, India

Nadia Heninger U. of Pennsylvania, USA

Thomas Holenstein ETH, Switzerland

Yuval Ishai Technion, Israel

Dimitar Jetchev EPFL, Switzerland

Aggelos Kiayias U. of Athens, Greece

Kaoru Kurosawa Ibaraki U., Japan

Alexander May U. Bochum, Germany

Ilya Mironov MSR, USA

Payman Mohassel U. of Calgary, Canada

Jörn Müller-Quade KIT, Germany

María Naya-Plasencia INRIA, France

Claudio Orlandi Aarhus U., Denmark

Rafael Pass Cornell U., USA

Chris Peikert Georgia Tech, USA

Krzysztof Pietrzak IST Austria

Leo Reyzin Boston U., USA

Ron Rivest MIT, USA

Amit Sahai UCLA, USA

Gil Segev Hebrew U., Israel

Elaine Shi U. of Maryland, USA

Tom Shrimpton Portland State U., USA

Alice Silverberg UC Irvine, USA

Marc Stevens CWI, The Netherlands

Katsuyuki Takashima Mitsubishi Electric, Japan

Stefano Tessaro UCSB, USA

Vinod Vaikuntanathan MIT, USA

Gilles Van Assche STM, Belgium

M.Venkitasubramaniam U. of Rochester, USA

Ivan Visconti U. of Salerno, Italy

Bogdan Warinschi U. of Bristol, UK

Brent Waters UT Austin, USA

Vassilis Zikas UCLA, USA