Conference Information
ProvSec 2018: International Conference on Provable Security
https://ssl.informatics.uow.edu.au/provsec2018/index.html
Submission Date:
2018-06-30 Extended
Notification Date:
2018-08-03
Conference Date:
2018-10-25
Location:
Jeju Island, Korea
Years:
12
Viewed: 2475   Tracked: 0   Attend: 0

Conference Location
Call For Papers
Provable security is an essential tool for analyzing security of modern cryptographic primitives. The research community has witnessed the great contributions that the provable security methodology made to the analysis of cryptographic schemes and protocols. Nowadays cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Also, the methodology has been used to discover security flaws in the cryptographic schemes and protocols, which were considered seemingly secure without formal analysis. On the one hand, provable security provides confidence in using cryptographic schemes and protocols for various real-world applications, but on the other hand, schemes with provable security are sometimes not efficient enough to be used in practice, and correctness of the proofs may be difficult to verify. Therefore, ProvSec conference is to provide a platform for researchers, scholars and practitioners to exchange new ideas on diverse problems in provable security.

Conference Topics:

All aspects of provable security in constructing and analyzing cryptographic primitives, including but are not limited to:

    - Provably secure asymmetric primitives
    - Provably secure symmetric primitives
    - Tightness of security reductions
    - Provable security in post-quantum cryptography
    - Privacy and anonymity technologies
    - Cryptographic protocol verifier
    - Theory and practice of game-hopping proof techniques
    - Secure hash functions
    - Provable security in the real-world security systems
    - Secure key management
    - Refinement of proof techniques
    - Provably Secure cryptographic protocols and applications
    - Security notions, approaches and paradigms
    - Steganography
    - Lightweight cryptography
    - Lattice-based cryptography

Publication and Awards:

The conference proceedings will be published by Springer-Verlag in the Lecture Notes in Computer Science series (see www.springer.com/lncs). The best paper(s) and best student paper(s) will be selected and awarded a prize. 
Last updated by Dou Sun in 2018-06-23
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
b1ICEC'International Conference on Electronic Commerce2013-03-162013-04-242013-08-13
ab1ISMMInternational Symposium on Memory Management2020-03-062020-04-192020-06-16
ICPSIEEE International Conference on Industrial Cyber-Physical Systems2020-01-202020-03-312020-06-09
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
MOBILWAREInternational Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications2020-02-202020-03-312020-07-10
SNSPInternational Conference on Sensor Networks and Signal Processing2018-10-08 2018-10-28
mLearnWorld Conference on Mobile and Contextual Learning2017-07-202017-08-282017-10-30
cIFIPTMIFIP WG 11.11 International Conference on Trust Management2019-04-092019-05-122019-07-17
ICDESInternational Conference on Design Engineering and Science2020-08-302020-09-302021-02-25
b2HCIIInternational Conference on Human-Computer Interaction2015-11-062015-12-042016-07-17
Related Journals
CCFFull NameImpact FactorPublisherISSN
New Ideas in Psychology1.353Elsevier0732-118X
International Journal of Information Security1.822Springer1615-5262
cIET Information Security0.862IET1751-8709
bJournal of Computer Security IOS Press0926-227X
bComputers & Security3.062Elsevier0167-4048
Infosecurity Elsevier1754-4548
Computer Fraud & Security Elsevier1361-3723
bACM Transactions of Information and System SecurityACM1094-9224
Journal of CybersecurityOxford University Press2057-2093
cEURASIP Journal on Information Security Springer1687-417X
Recommendation