Conference Information
CT-RSA 2018: The Cryptographer's Track at RSA Conference
Submission Date:
Notification Date:
Conference Date:
San Francisco, California, USA
CCF: c   Viewed: 14754   Tracked: 11   Attend: 0

Conference Location
Call For Papers
 CT-RSA, or Cryptographers Track RSA Conference, is the venue for scientific papers on cryptography within the RSA Conference. For those who have never been the RSA Conference is the main trade show for the security industry; over 40,000 people attend the exhibition floor, keynote addresses, events, seminars, training events and the various technical tracks. CT-RSA is the track devoted to scientific papers on cryptography. As such CT-RSA is a great venue to ensure that scientific results not only get published to the wider cryptologic community, but also get exposed to technical attendees from industry, government and wider afield.

Original papers on all technical aspects of cryptology are solicited for submission. Topics included but are not limited to:

Public-key algorithms 	
Symmetric-key algorithms 	
Hash functions
Random Number Generators 	
Cryptographic protocols
Cryptographic standards 	
Cryptographic aspects of network security 	
CryptoCurrencies and blockchain
Efficient implementations 	
Elliptic-curve cryptography 	
Hardware security
Post-quantum cryptography 	
Voting Technologies 	
Side-channel attacks and defenses
White-box cryptography 	

Given the wider audience of the CT-RSA track within the RSA Conference itself, the committee will give a strong preference to papers which are of a broad interest to the security professional.

In addition, for the same reasons, we particularly welcome systematization of knowledge (SoK) papers, which should aim to evaluate, systematize, and contextualize existing knowledge. Such papers may not necessarily contain novel research contributions, but they should be of high value to the community. Examples of SoK papers could include survey papers that provide a new perspective on a research area, papers that support or challenge long-held beliefs with compelling evidence, or papers that provide an extensive and realistic evaluation of competing approaches to solving specific problems. Again SoK papers on cryptography which are of a broad interest to a security professional will be especially encouraged. 
Last updated by Xin Yao in 2017-08-21
Acceptance Ratio
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
IConDAInternational Conference on Computer & Drone Applications2019-11-15 2019-12-19
DaMiInternational Conference on Data Mining2020-05-302020-06-062020-06-13
IISWCIEEE International Symposium on Workload Characterization2020-07-102020-08-242020-10-27
cb3AOSEInternational Workshop on Agent-Oriented Software Engineering 2012-04-062012-06-04
ba2CODES+ISSSInternational Conference on Hardware/Software Codesign and System Synthesis2020-04-032020-07-062020-10-11
cb1IHInformation Hiding Conference2012-02-052012-04-012012-05-15
EBCCSPInternational Conference on Event-Based Control, Communication and Signal Processing2016-03-202016-04-102016-06-13
ICCSAITInternational Conference on Computer Science and Information Technologies2014-03-162014-04-162014-08-22
IUrCInternational Conference on Intelligent Urban Computing2014-07-112014-07-182014-08-14
Related Journals
CCFFull NameImpact FactorPublisherISSN
International Journal on Cryptography and Information Security AIRCC1839-8626
Journal of Cryptographic Engineering Springer2190-8508
International Journal of Cartography Taylor & Francis2372-9333
Computers & Education5.627Elsevier0360-1315
Computers & Structures3.354Elsevier0045-7949
bDesigns, Codes and Cryptography0.958Springer0925-1022
International Journal on Communications Antenna and PropagationPraise Worthy Prize2039-5086
cJournal of Computer Information Systems0.822IACIS0887-4417
Control Engineering Practice3.232Elsevier0967-0661
bComputers & Security3.062Elsevier0167-4048