Conference Information
ProvSec 2025: International Conference on Provable and Practical Security
Please Login to view website of conference

Submission Date:
2025-06-14 Extended
Notification Date:
2025-07-15
Conference Date:
2025-10-10
Location:
Yokohama, Japan
Years:
19
Viewed: 19786   Tracked: 3   Attend: 0

Call For Papers
Provable security is a critical tool for analyzing the security of modern cryptographic primitives in order to achieve high assurance of trustworthy and secure cyber systems. Provable security methodology contributed greatly to the analysis of cryptographic schemes and protocols, as well as their implementations in trusted and secure systems. However, cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Security flaws in many cryptographic schemes and protocols once considered secure without formal analysis have been discovered using Provable Security methodology. Although Provable Security provides confidence in using cryptographic schemes and protocols for various real-world applications, schemes with Provable Security are sometimes not efficient enough for practical purposes, and it may be difficult to verify the correctness of the proofs.

We will continue to promote "Practical Security" as the theme for ProvSec2025. The event convened researchers and practitioners to provide a confluence of new practical cyber security technologies, including their applications and integration with IT systems in various industrial sectors.

Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:

Provable security for asymmetric cryptography
Provable security for symmetric cryptography
Provable security for physical attacks
Privacy and anonymity technologies
Secure cryptographic protocols and applications
Security notions, approaches, and paradigms
Leakage-resilient cryptography
Lattice-based cryptography and post-quantum cryptography
Steganography and steganalysis
Blockchain and cryptocurrency
IoT security
Cloud security
Access control
Privacy-enhancing technologies
Database security
Big data security and privacy
Biometric security
Network security
Formal methods for security
Embedded systems security
Lightweight security
Cyber-physical security
Last updated by Dou Sun in 2025-06-07
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cb2PSTInternational Conference on Privacy, Security and Trust2026-04-102026-06-012026-08-26
cbb1SOUPSInternational Symposium On Usable Privacy and Security2026-02-122026-05-192026-08-23
cbb1FCInternational Conference on Financial Cryptography and Data Security2025-09-202025-11-242026-03-02
cba2ISCInformation Security Conference2025-06-042025-07-292025-10-20
cbb1ICICSInternational Conference on Information and Communications Security2025-05-232025-07-212025-10-29
baa2ESORICSEuropean Symposium on Research in Computer Security2025-04-222025-06-132025-09-22
cb3CISInternational Conference on Computational Intelligence and Security2020-08-052020-08-312020-11-27
cHotSecUSENIX Workshop on Hot Topics in Security2020-06-042020-06-152020-08-11
bb1ARESInternational Conference on Availability, Reliability and Security2020-04-152020-06-032020-08-24
cIASInternational Conference on Information Assurance and Security 2015-10-212015-11-102015-12-07
Related Journals
CCFFull NameImpact FactorPublisherISSN
Virtual and Physical Prototyping8.8Taylor & Francis1745-2759
aIEEE Transactions on Information Forensics and Security8.0IEEE1556-6013
Control Engineering Practice4.6Elsevier0967-0661
International Journal of Information Security3.2Springer1615-5262
ACM Transactions on Privacy and Security2.8ACM2471-2566
bSoftware: Practice and Experience2.7John Wiley & Sons, Ltd1097-024X
Progress in Artificial Intelligence2.4Springer2192-6352
cEURASIP Journal on Information Security2.1Springer1687-417X
cIET Information Security1.300IET1751-8709
cInternational Journal of Information Security and Privacy0.800Idea Group Inc1930-1650