Conference Information
ProvSec 2025: International Conference on Provable and Practical Security
https://sulab-sever.u-aizu.ac.jp/provsec2025/index.html
Submission Date:
2025-06-14 Extended
Notification Date:
2025-07-15
Conference Date:
2025-10-10
Location:
Yokohama, Japan
Years:
19
Viewed: 16728   Tracked: 3   Attend: 0

Call For Papers
Provable security is a critical tool for analyzing the security of modern cryptographic primitives in order to achieve high assurance of trustworthy and secure cyber systems. Provable security methodology contributed greatly to the analysis of cryptographic schemes and protocols, as well as their implementations in trusted and secure systems. However, cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Security flaws in many cryptographic schemes and protocols once considered secure without formal analysis have been discovered using Provable Security methodology. Although Provable Security provides confidence in using cryptographic schemes and protocols for various real-world applications, schemes with Provable Security are sometimes not efficient enough for practical purposes, and it may be difficult to verify the correctness of the proofs.

We will continue to promote "Practical Security" as the theme for ProvSec2025. The event convened researchers and practitioners to provide a confluence of new practical cyber security technologies, including their applications and integration with IT systems in various industrial sectors.

Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:

    Provable security for asymmetric cryptography
    Provable security for symmetric cryptography
    Provable security for physical attacks
    Privacy and anonymity technologies
    Secure cryptographic protocols and applications
    Security notions, approaches, and paradigms
    Leakage-resilient cryptography
    Lattice-based cryptography and post-quantum cryptography
    Steganography and steganalysis
    Blockchain and cryptocurrency
    IoT security
    Cloud security
    Access control
    Privacy-enhancing technologies
    Database security
    Big data security and privacy
    Biometric security
    Network security
    Formal methods for security
    Embedded systems security
    Lightweight security
    Cyber-physical security
Last updated by Dou Sun in 2025-06-07
Related Conferences
Related Journals
CCFFull NameImpact FactorPublisherISSN
Optical Memory and Neural Networks1.000Springer1060-992X
bIEEE Transactions on VLSI Systems2.800IEEE1063-8210
Brain-Computer Interfaces1.800Taylor & Francis2326-263X
cArtificial Intelligence in Medicine6.1Elsevier0933-3657
International Journal of Distributed Sensor NetworksHindawi1550-1329
Robotics and Computer-Integrated Manufacturing11.4Elsevier0736-5845
Computational Statistics1.000Springer0943-4062
Polymer4.1Elsevier0032-3861
International Journal of ComputingResearch Institute of Intelligent Computer Systems1727-6209