posted by user: bluo || 6020 views || tracked by 3 users: [display]

SCI 2020 : ACNS Workshop on Secure Cryptographic Implementation

FacebookTwitterLinkedInGoogle

Link: https://sci.ittc.ku.edu/
 
When Oct 19, 2020 - Oct 22, 2020
Where Virtual Workshop (was in Rome, Italy)
Submission Deadline Jul 10, 2020
Notification Due Aug 5, 2020
Final Version Due Aug 17, 2020
Categories    cryptography   security   cybersecurity   computer sciecne
 

Call For Papers

In recent years, we have witnessed severe security incidences caused by buggy implementations of cryptographic algorithms: POODLE, DROWN, OpenSSL Heartbleed, etc. It is critical for practitioners and researchers to ensure the security of cryptographic hardware and software, which are essential for a wide range of systems, services and applications.

The aim of the workshop is to provide an international forum of scientific research and development to explore the security issues in the implementation and deployment of cryptographic algorithms. We are interested in these main aspects: (1) vulnerabilities and defenses in the implementation of cryptographic algorithms; (2) vulnerabilities and defenses in the implementation of cryptographic protocols; (3) defective cryptographic algorithms and protocols deployed in the wild; (3) weak cryptographic keys and random numbers in the cryptographic implementation; (4) runtime cryptographic key attacks and protections; (5) fraudulent certificates and key management; and (6) other topics on secure cryptographic implementations. We solicitate submissions of original research papers on a wide range of topics, including but not limited to:

- Secure implementations of crypto algorithms & protocols
- Vulnerable implementations in the wild
- Weak cryptographic keys
- Cryptographic key attacks and defense
- Side Channels
- Cryptographic Hardware
- Physical attacks and defense
- Cryptography for Blockchain
- Cryptography for IoT/CPS
- Cryptography for the Cloud
- Verification and evaluation tools

We are especially interested in papers with novel ideas, position papers, pilot studies and initial findings. ACNS will also award best papers from all accepted workshop papers. Meanwhile, the workshop will include an interesting keynote talk, which will be announced on the workshop web site as arrangements are finalized.

Prospective authors are invited to submit manuscript describing original work. The manuscript has to be written in English and in PDF format. All submissions must follow the original LNCS format (see http://www.springeronline.com/lncs) with a page limit of 18 pages. The proceedings of the SCI workshop will be published by Springer in the LNCS series.

Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ACNS-SCI 2024   5th ACNS Workshop on Secure Cryptographic Implementation
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ICTC--SCI 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
PLDI 2025   The ACM SIGPLAN Conference on Programming Language Design and Implementation
IJCSITY 2024   International Journal of Computational Science and Information Technology
ICTC 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
ISKE--SCI 2025   The 20th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2025)
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)