Conference Information
PKC 2017 : International Conference on Practice and Theory in Public Key Cryptography
http://www.iacr.org/workshops/pkc2017/
Submission Date:
2016-10-06
Notification Date:
2016-12-15
Conference Date:
2017-03-28
Location:
Amsterdam, The Netherlands
Years:
20
CCF: b   CORE: b   QUALIS: a2   Viewed: 7293   Tracked: 8   Attend: 0

Conference Location
Advertisment
Call For Papers
General Information

This is the 20th edition of the International Conference on Practice and Theory of Public Key Cryptography, the main annual conference with an explicit focus on public-key cryptography, sponsored by IACR, the International Association for Cryptologic Research. Original research papers on all aspects of public-key cryptography, covering theory, implementations and applications, are solicited for submission to PKC 2017. Accepted papers will be published by Springer in their Lecture Notes in Computer Science series.

Instructions for Authors

Submissions should be prepared using LaTeX and must be in the standard Springer LNCS format, with the (only) modification that page numbers must be displayed — this can be done by putting \pagestyle{plain} into the preamble. Submissions should begin with a title and a short abstract, followed by an introduction that summarizes the contribution of the paper so that it is understandable to a non-expert in the field. Submissions must be anonymous, with no author names, affiliations, or obvious references.

Submissions must be at most 30 pages, including title page, references, and figures. The final published version of an accepted paper is expected to closely match these submitted pages. If necessary, clearly marked supplementary material (of unbounded size) may be appended to the actual submission. However, submissions are expected to be intelligible and verifiable without the supplementary material; reviewers are not required to read it. In particular, it is discouraged to move crucial proofs into the supplementary material, and in cases where this is unavoidable it is expected that a short but convincing proof sketch is provided in the main body.

Submissions must not substantially duplicate published work or work that has been submitted in parallel to any other journal or conference/workshop with proceedings. All submissions to PKC 2017 are viewed as active submissions throughout the entire review period; they cannot be submitted to any other journal or conference/workshop with proceedings before the notification date. Accepted submissions cannot appear in any other conference or workshop that has proceedings. IACR reserves the right to share information about submissions with other program committees. The IACR Policy on Irregular Submissions and Guidelines for Authors, as well as other resources, are all available via http://www.iacr.org/docs.

Papers must be submitted electronically; a detailed description of the electronic submission procedure will be available via the conference web-page http://www.iacr.org/workshops/pkc2017. Submissions not meeting any of the guidelines above risk rejection without consideration of their merits. All accepted papers must conform to Springer publishing requirements and authors will be required to sign the IACR Copyright and Consent Form when submitting the proceedings version of their papers. Authors must guarantee that their paper, if accepted, will be presented at the conference by one of the authors. 
Last updated by Xin Yao in 2016-06-23
Related Publications
Acceptance Ratio
YearSubmittedAcceptedAccepted(%)
20141453826.2%
2013962829.2%
20121884121.8%
20111032827.2%
20101452920%
20091122825%
2008713042.3%
20071182924.6%
20061243427.4%
20051262822.2%
20041063230.2%
Advertisment
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cb1IHInformation Hiding Conference2012-02-052012-04-012012-05-15
ICNSCIEEE International Conference on Networking, Sensing and Control2016-12-012017-01-152017-05-16
cChinaGridChinaGrid Annual Conference2013-04-212013-05-142013-08-22
ICITSInternational Conference on Information Theoretic Security2016-04-202016-06-012016-08-09
aa*a1CRYPTOInternational Cryptology Conference2017-02-082017-05-082017-08-20
AIPRInternational Conference on Artificial Intelligence and Pattern Recognition2017-07-012017-08-102017-09-18
CCVInternational Conference on Cloud Computing and Virtualization2011-12-09 2012-04-16
cb2ICTInternational Conference on Telecommunications2015-11-152016-01-152016-05-16
SSIAISouthwest Symposium on Image Analysis and Interpretation2011-12-192012-02-272012-04-22
DBSecInternational Conference on Data and Applications Security and Privacy2015-03-072015-04-202015-07-13
Related Journals
Recommendation