Conference Information
ProvSec 2025: International Conference on Provable and Practical Security
https://sulab-sever.u-aizu.ac.jp/provsec2025/index.htmlSubmission Date: |
2025-06-14 Extended |
Notification Date: |
2025-07-15 |
Conference Date: |
2025-10-10 |
Location: |
Yokohama, Japan |
Years: |
19 |
Viewed: 18783 Tracked: 3 Attend: 0
Call For Papers
Provable security is a critical tool for analyzing the security of modern cryptographic primitives in order to achieve high assurance of trustworthy and secure cyber systems. Provable security methodology contributed greatly to the analysis of cryptographic schemes and protocols, as well as their implementations in trusted and secure systems. However, cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Security flaws in many cryptographic schemes and protocols once considered secure without formal analysis have been discovered using Provable Security methodology. Although Provable Security provides confidence in using cryptographic schemes and protocols for various real-world applications, schemes with Provable Security are sometimes not efficient enough for practical purposes, and it may be difficult to verify the correctness of the proofs.
We will continue to promote "Practical Security" as the theme for ProvSec2025. The event convened researchers and practitioners to provide a confluence of new practical cyber security technologies, including their applications and integration with IT systems in various industrial sectors.
Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
Provable security for asymmetric cryptography
Provable security for symmetric cryptography
Provable security for physical attacks
Privacy and anonymity technologies
Secure cryptographic protocols and applications
Security notions, approaches, and paradigms
Leakage-resilient cryptography
Lattice-based cryptography and post-quantum cryptography
Steganography and steganalysis
Blockchain and cryptocurrency
IoT security
Cloud security
Access control
Privacy-enhancing technologies
Database security
Big data security and privacy
Biometric security
Network security
Formal methods for security
Embedded systems security
Lightweight security
Cyber-physical security
Last updated by Dou Sun in 2025-06-07
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Virtual and Physical Prototyping | 8.8 | Taylor & Francis | 1745-2759 | |
| a | IEEE Transactions on Information Forensics and Security | 8.0 | IEEE | 1556-6013 |
| Control Engineering Practice | 4.6 | Elsevier | 0967-0661 | |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| ACM Transactions on Privacy and Security | 2.8 | ACM | 2471-2566 | |
| b | Software: Practice and Experience | 2.7 | John Wiley & Sons, Ltd | 1097-024X |
| Progress in Artificial Intelligence | 2.4 | Springer | 2192-6352 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| c | International Journal of Information Security and Privacy | 0.800 | Idea Group Inc | 1930-1650 |