Conference Information
ProvSec 2025: International Conference on Provable and Practical Security
https://sulab-sever.u-aizu.ac.jp/provsec2025/index.html
Submission Date:
2025-06-14 Extended
Notification Date:
2025-07-15
Conference Date:
2025-10-10
Location:
Yokohama, Japan
Years:
19
Viewed: 18783   Tracked: 3   Attend: 0

Call For Papers
Provable security is a critical tool for analyzing the security of modern cryptographic primitives in order to achieve high assurance of trustworthy and secure cyber systems. Provable security methodology contributed greatly to the analysis of cryptographic schemes and protocols, as well as their implementations in trusted and secure systems. However, cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Security flaws in many cryptographic schemes and protocols once considered secure without formal analysis have been discovered using Provable Security methodology. Although Provable Security provides confidence in using cryptographic schemes and protocols for various real-world applications, schemes with Provable Security are sometimes not efficient enough for practical purposes, and it may be difficult to verify the correctness of the proofs.

We will continue to promote "Practical Security" as the theme for ProvSec2025. The event convened researchers and practitioners to provide a confluence of new practical cyber security technologies, including their applications and integration with IT systems in various industrial sectors.

Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:

    Provable security for asymmetric cryptography
    Provable security for symmetric cryptography
    Provable security for physical attacks
    Privacy and anonymity technologies
    Secure cryptographic protocols and applications
    Security notions, approaches, and paradigms
    Leakage-resilient cryptography
    Lattice-based cryptography and post-quantum cryptography
    Steganography and steganalysis
    Blockchain and cryptocurrency
    IoT security
    Cloud security
    Access control
    Privacy-enhancing technologies
    Database security
    Big data security and privacy
    Biometric security
    Network security
    Formal methods for security
    Embedded systems security
    Lightweight security
    Cyber-physical security
Last updated by Dou Sun in 2025-06-07
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cbb1FCInternational Conference on Financial Cryptography and Data Security2025-09-202025-11-242026-03-02
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
baa2ESORICSEuropean Symposium on Research in Computer Security2025-04-222025-06-132025-09-22
cb2PSTInternational Conference on Privacy, Security and Trust2025-04-042025-06-012025-08-26
cbb1SOUPSInternational Symposium On Usable Privacy and Security2025-02-132025-05-122025-08-10
cb3CISInternational Conference on Computational Intelligence and Security2020-08-052020-08-312020-11-27
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
bb1ARESInternational Conference on Availability, Reliability and Security2020-04-152020-06-032020-08-24
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
Related Journals
CCFFull NameImpact FactorPublisherISSN
Virtual and Physical Prototyping8.8Taylor & Francis1745-2759
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
Control Engineering Practice4.6Elsevier0967-0661
International Journal of Information Security3.2Springer1615-5262
ACM Transactions on Privacy and Security2.8ACM2471-2566
bSoftware: Practice and Experience2.7John Wiley & Sons, Ltd1097-024X
Progress in Artificial Intelligence2.4Springer2192-6352
cEURASIP Journal on Information Security2.1Springer1687-417X
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650