Conference Information
CT-RSA 2021: The Cryptographer's Track at RSA Conference
Submission Date:
Notification Date:
Conference Date:
San Francisco, California, USA
CCF: c   Viewed: 16218   Tracked: 16   Attend: 1

Conference Location
Call For Papers
CT-RSA, or Cryptographers' Track RSA Conference, is the venue for scientific papers on cryptography within the RSA Conference. The RSA Conference is the main trade show for the security industry; over 40,000 people attend the exhibition floor, keynote addresses, events, seminars, training events and the various technical tracks. CT-RSA is the track devoted to scientific papers on cryptography. As such CT-RSA is a great venue to ensure that scientific results not only get published to the wider cryptologic community, but also get exposed to technical attendees from industry, government and wider afield. 

Original papers on all technical aspects of cryptology are solicited for submission. Topics included but are not limited to:

Public-key algorithms
Hash functions
Applied cryptography
Cryptographic protocols
Cryptocurrencies and blockchain
Elliptic-curve cryptography
Post-quantum cryptography
Side-channel attacks and defenses
Symmetric-key algorithms
Random Number Generators
Cryptographic standards
Efficient implementations
Hardware security
White-box cryptography

Given the wider audience of the CT-RSA track within the RSA Conference itself, the committee will give preference to papers which are of a broad interest to security professionals. (For reference, see the DBLP list of CT-RSA publications of previous editions of the CT-RSA conference.) 

In addition, for the same reasons, we welcome systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Such papers may not necessarily contain novel research contributions, but they should be of high value to the community. Examples of SoK papers could include survey papers that provide a new perspective on a research area, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. SoK papers on cryptography which are of a broad interest to a security professional will be especially encouraged. 

Finally, given the current uncertainty around COVID-19, we will support remote presentation for those authors of accepted papers who wish to make use of it.
Last updated by Dou Sun in 2020-09-22
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
RoboComInternational Workshop on Communication and Networking for Swarms Robotics2020-10-162020-11-022021-01-09
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
DaMiInternational Conference on Data Mining2020-12-122021-02-252021-04-24
IConDAInternational Conference on Computer & Drone Applications2019-11-15 2019-12-19
IISWCIEEE International Symposium on Workload Characterization2020-07-102020-08-242020-10-27
cb3AOSEInternational Workshop on Agent-Oriented Software Engineering 2012-04-062012-06-04
ba2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2020-04-032020-07-062020-10-11
cb1IHInformation Hiding Conference2012-02-052012-04-012012-05-15
EBCCSPInternational Conference on Event-Based Control, Communication and Signal Processing2016-03-202016-04-102016-06-13
IUrCInternational Conference on Intelligent Urban Computing2014-07-112014-07-182014-08-14
Related Journals
CCFFull NameImpact FactorPublisherISSN
International Journal on Cryptography and Information Security AIRCC1839-8626
Journal of Cryptographic Engineering Springer2190-8508
International Journal of Cartography Taylor & Francis2372-9333
Computers & Education5.627Elsevier0360-1315
Computers & Structures3.354Elsevier0045-7949
bDesigns, Codes and Cryptography0.958Springer0925-1022
International Journal on Communications Antenna and PropagationPraise Worthy Prize2039-5086
Control Engineering Practice3.232Elsevier0967-0661
cJournal of Computer Information Systems0.822IACIS0887-4417
bComputers & Security3.062Elsevier0167-4048