Conference Information
ProvSec 2025: International Conference on Provable and Practical Security
https://sulab-sever.u-aizu.ac.jp/provsec2025/index.htmlSubmission Date: |
2025-06-14 Extended |
Notification Date: |
2025-07-15 |
Conference Date: |
2025-10-10 |
Location: |
Yokohama, Japan |
Years: |
19 |
Viewed: 17685 Tracked: 3 Attend: 0
Call For Papers
Provable security is a critical tool for analyzing the security of modern cryptographic primitives in order to achieve high assurance of trustworthy and secure cyber systems. Provable security methodology contributed greatly to the analysis of cryptographic schemes and protocols, as well as their implementations in trusted and secure systems. However, cryptographic primitives without a rigorous "proof" cannot be regarded as sound. Security flaws in many cryptographic schemes and protocols once considered secure without formal analysis have been discovered using Provable Security methodology. Although Provable Security provides confidence in using cryptographic schemes and protocols for various real-world applications, schemes with Provable Security are sometimes not efficient enough for practical purposes, and it may be difficult to verify the correctness of the proofs.
We will continue to promote "Practical Security" as the theme for ProvSec2025. The event convened researchers and practitioners to provide a confluence of new practical cyber security technologies, including their applications and integration with IT systems in various industrial sectors.
Authors are invited to submit original research papers on provable and practical security. Areas of interest include, but are not limited to:
Provable security for asymmetric cryptography
Provable security for symmetric cryptography
Provable security for physical attacks
Privacy and anonymity technologies
Secure cryptographic protocols and applications
Security notions, approaches, and paradigms
Leakage-resilient cryptography
Lattice-based cryptography and post-quantum cryptography
Steganography and steganalysis
Blockchain and cryptocurrency
IoT security
Cloud security
Access control
Privacy-enhancing technologies
Database security
Big data security and privacy
Biometric security
Network security
Formal methods for security
Embedded systems security
Lightweight security
Cyber-physical security
Last updated by Dou Sun in 2025-06-07
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| FC | International Conference on Financial Cryptography and Data Security | 2026-03-02 |
| CIS | International Conference on Computational Intelligence and Security | 2020-11-27 |
| ESORICS | European Symposium on Research in Computer Security | 2025-09-22 |
| ICICS | International Conference on Information and Communications Security | 2025-10-29 |
| HotSec | USENIX Workshop on Hot Topics in Security | 2020-08-11 |
| IAS | International Conference on Information Assurance and Security | 2015-12-07 |
| ARES | International Conference on Availability, Reliability and Security | 2020-08-24 |
| ISC | Information Security Conference | 2025-10-20 |
| PST | International Conference on Privacy, Security and Trust | 2025-08-26 |
| SOUPS | International Symposium On Usable Privacy and Security | 2025-08-10 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| ACM Transactions on Privacy and Security | 3.000 | ACM | 2471-2566 | |
| c | IET Information Security | 1.300 | IET | 1751-8709 |
| International Journal of Information Security | 2.400 | Springer | 1615-5262 | |
| Journal of Internet Security | DDSecure.Net Inc. | 1206-4890 | ||
| Computer Fraud & Security | Elsevier | 1361-3723 | ||
| c | EURASIP Journal on Information Security | 2.500 | Springer | 1687-417X |
| International Journal on Cryptography and Information Security | AIRCC | 1839-8626 | ||
| ACM Transactions on Probabilistic Machine Learning | ACM | 0000-0000 | ||
| a | IEEE Transactions on Information Forensics and Security | 6.300 | IEEE | 1556-6013 |
| b | Software: Practice and Experience | 3.200 | John Wiley & Sons, Ltd | 1097-024X |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| ACM Transactions on Privacy and Security | 3.000 | ACM |
| IET Information Security | 1.300 | IET |
| International Journal of Information Security | 2.400 | Springer |
| Journal of Internet Security | DDSecure.Net Inc. | |
| Computer Fraud & Security | Elsevier | |
| EURASIP Journal on Information Security | 2.500 | Springer |
| International Journal on Cryptography and Information Security | AIRCC | |
| ACM Transactions on Probabilistic Machine Learning | ACM | |
| IEEE Transactions on Information Forensics and Security | 6.300 | IEEE |
| Software: Practice and Experience | 3.200 | John Wiley & Sons, Ltd |