Selected Areas in Cryptography (SAC) 2018
Selected Areas in Cryptography (SAC) 2018
Selected Areas in Cryptography (SAC) 2018
View the information below in PDF format
Authors are encouraged to submit original papers related to the following themes for SAC 2018. Note that the first three are traditional SAC areas; the fourth topic is the special focus for this year.
- Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes.
- Efficient implementations of symmetric and public key algorithms.
- Mathematical and algorithmic aspects of applied cryptology.
- Cryptography for the Internet of Things.
- Papers must be submitted electronically, via the submission webpage at https://easychair.org/conferences/?conf=sac2018. Late submissions, submissions by email, or hardcopy submissions will not be accepted.
- Submissions must be anonymous, with no author names, affiliations, acknowledgments or obvious references.
- Papers should be at most 16 pages in length, excluding bibliography and clearly marked appendices and typeset using LaTeX and the LNCS style (available on the Springer LNCS website). Total length must not exceed 24 pages. Program Committee members are not required to read appendices, so the paper should be intelligible without them.
- Papers must be written in English, and begin with a title, a short abstract, and a list of keywords. An introduction section should summarize the paper’s contributions at a level appropriate for a non-specialist reader.
- Submissions should be in PDF format. If at all possible, the paper should use Type 1 (outline) fonts rather than Type 3 (bitmap) fonts.
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference/workshop that has proceedings. The SAC 2018 Chairs reserve the right to share information about submissions with other program committees or journal editors to detect parallel submissions. In addition, the SAC Chairs reserve the right to contact an author’s institution/corporation and/or other appropriate organizations if an irregular submission is detected. Submissions not meeting these guidelines risk rejection without consideration of their merits. For further details, please refer to the IACR Policy on Irregular Submissions at https://www.iacr.org/docs/irregular.pdf.
Conflicts of Interest: Authors, program committee members, and reviewers for SAC 2018 must adhere to the IACR Policy on Conflicts of Interest. Authors are requested to identify all members of the SAC 2018 Program Committee who have an automatic conflict of interest (COI) with the submission, and disclose it to the chairs by email sac2018.pc.chair@gmail.com at the time of submission. It is the responsibility of all authors to ensure correct reporting of COI information. Submissions with incorrect or incomplete COI information may be rejected without consideration of their merits. For further details, please refer to the IACR Policy on Conflicts of Interest at https://www.iacr.org/docs/conflicts.pdf.
Submission implies the commitment of at least one of the authors to present the paper at the conference. The SAC 2018 Chairs reserve the right to withdraw papers from the proceedings that are not presented at the conference. The SAC 2018 proceedings will be published by Springer in the Lecture Notes in Computer Science series.
Call for Papers Submission deadline: | 9 May 2018 (23:59 UTC) |
Call for Papers Extended Submission deadline: | 14 May 2018 (23:59 UTC) |
Notifications: | 27 June 2018 |
Pre-proceedings version deadline: | 18 July 2018 |
SAC Summer School: | 13-14 August 2018 |
Conference: | 15-17 August 2018 |
- Carlisle Adams, University of Ottawa, Canada
- Diego Aranha, University of Campinas, Brazil
- Frederik Armknecht, Universität Mannheim, Germany
- Roberto Avanzi, ARM, Germany
- Steve Babbage, Vodafone, UK
- Paulo Barreto, University of Washington Tacoma, USA
- Daniel J. Bernstein, University of Illinois at Chicago, USA
- Alex Biryukov, University of Luxembourg, Luxembourg
- Andrey Bogdanov, DTU, Denmark
- Carlos Cid, Royal Holloway, University of London, UK (CHAIR)
- Vassil Dimitrov, University of Calgary, Canada
- Itai Dinur, Ben-Gurion University, Israel
- Maria Eichlseder, TU Graz, Austria
- Pierre-Alain Fouque, Univ Rennes and Institut Universitaire de France, France
- Guang Gong, University of Waterloo, Canada
- Johann Groszschaedl, University of Luxembourg, Luxembourg
- M. Anwar Hasan, University of Waterloo, Canada
- Howard Heys, Memorial University of Newfoundland, Canada
- Jérémy Jean, ANSSI, France
- Elif Bilge Kavun, Infineon Technologies, Germany
- Stefan Kölbl, DTU, Denmark
- Gaëtan Leurent, INRIA, France
- Subhamoy Maitra, Indian Statistical Institute, India
- Brice Minaud, Royal Holloway, University of London, UK
- Nicky Mouha, NIST, USA
- Michael Naehrig, Microsoft Research, USA
- Svetla Nikova, KU Leuven, Belgium
- Ludovic Perret, Sorbonne University/INRIA/CNRS, France
- Josef Pieprzyk, Data61, CSIRO, Australia
- Francesco Regazzoni, Università della Svizzera Italiana, Switzerland
- Matt Robshaw, Impinj, USA
- Sondre Rønjom, University of Bergen, Norway
- Fabrizio De Santis, Siemens AG, Germany
- Sujoy Sinha Roy, KU Leuven, Belgium
- Jörn-Marc Schmidt, secunet Security Networks, Germany
- Peter Schwabe, Radboud University, Netherlands
- Kyoji Shibutani, Sony Corporation, Japan
- Paul Stankovski, Lund University, Sweden
- Frederik Vercauteren, KU Leuven, Belgium
- Meiqin Wang, Shandong University, China
- Hongjun Wu, Nanyang Technological University, Singapore
- Huapeng Wu, University of Windsor, Canada
- Bo-Yin Yang, Academia Sinica, Taiwan
- Kan Yasuda, NTT, Japan
- Amr Youssef, Concordia University, Canada