Conference Information
INSCRYPT 2025: International Conference on Information Security and Cryptology
Please Login to view website of conference

Submission Date:
2025-06-15
Notification Date:
2025-08-01
Conference Date:
2025-10-19
Location:
Xi an, China
Years:
21
CCF: c   Viewed: 49893   Tracked: 71   Attend: 14

Call For Papers
Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to:

Cryptologic Track

Foundations of Cryptography
Provable Security
Sequences and Boolean Functions
Secure Multiparty Computation
Symmetric Key Cryptosystems
Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Key Management and Key Recovery
Security Protocols and Their Analysis
Information Hiding and Watermarking
Secure computation outsourcing
Functional computation and verifiable computation
Obfuscation
Leakage-resilient cryptography

Security Track

Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Electronic Commerce Security
Intrusion Detection
Network Security
Security Modeling and Architectures
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Privacy-enhancing technologies
Genomic privacy and SDN security
Big data and cloud security
Last updated by Dou Sun in 2025-03-02
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cACISPAustralasian Conference on Information Security and Privacy2026-02-262026-04-162026-07-06
bb3ICISSInternational Conference on Information Systems Security2025-08-102025-10-032025-12-16
cINSCRYPTInternational Conference on Information Security and Cryptology2025-06-152025-08-012025-10-19
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
bISPECInternational Conference on Information Security Practice and Experience2024-05-132024-06-242024-10-25
cWISTPInternational Conference on Information Security Theory and Practice2024-01-152024-02-052024-02-29
b4EITInternational Conference on Electro/Information Technology2016-02-152016-03-152016-05-19
cISA'International Conference on Information Security and Assurance2016-01-302016-02-152016-03-24
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
bICISCInternational Conference on Information Security and Cryptology2015-09-072015-10-192015-11-25
Related Journals
CCFFull NameImpact FactorPublisherISSN
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
Information Technology & People5.6Emerald0959-3845
bInformation and Software Technology4.3Elsevier0950-5849
Ethics and Information Technology4.0Springer1388-1957
cJournal of Information Security and Applications3.7Elsevier2214-2126
International Journal of Information Security3.2Springer1615-5262
The Information Society3.0Taylor & Francis0197-2243
cEURASIP Journal on Information Security2.1Springer1687-417X
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650