Información de la conferencia
ASIACRYPT 2025: International Conference on the Theory and Application of Cryptology and Information Security
https://asiacrypt.iacr.org/2025/
Día de Entrega:
2025-05-16
Fecha de Notificación:
2025-08-10
Fecha de Conferencia:
2025-12-08
Ubicación:
Melbourne, Australia
Años:
31
CCF: b   CORE: a   QUALIS: a1   Vistas: 67966   Seguidores: 64   Asistentes: 5

Solicitud de Artículos
General information

Asiacrypt 2025 is organized by the International Association for Cryptologic Research in Melbourne from December 8-12, run by general chair Professor Joseph Liu. The proceedings will be published by Springer in the Lecture Notes in Computer Science (LNCS) series. We solicit all original research papers on all aspects of cryptology for submission. This call for papers is also available as a PDF.

As a general IACR conference, we would like to be as inclusive as possible; in particular, a topic for any IACR area conference is a topic for Asiacrypt, and PC members are no longer allowed to issue reviews such as “This topic is more suitable for [area conference]”.

Schedule

Asiacrypt 2025 will operate a two-round review system with rebuttal phase. In the first round, the program committee selects a subset of submissions for further consideration in the second round, and the authors receive the first round notification with review comments. The authors of the selected submissions are invited to submit a text-based rebuttal letter to the review comments.

In the second round, the program committee further reviews the selected submissions by taking into account their rebuttal letter, acting on all answers of questions issued as pertinent to the decision. The PC chairs make the final decision of acceptance or rejection in consultation with the area chairs and the reviewers. Submissions that have not been selected during the first round of reviews may be resubmitted in other conferences after the first round notification date.

Artifacts

In order to encourage open and reproducible research, authors of accepted papers will be invited to submit artifacts associated with their papers, such as software or datasets, for review. The artifact review will be a collaborative process between authors and the artifact review committee. The goal of the process is not just to evaluate artifacts, but also to improve them for reproduction and reusability by the scientific community.

Artifacts that pass successfully through the artifact review process will be archived on IACR's artifact archive. With comparable merit, priority will be given to papers with machine-verified proofs.Please see the detailed call for artifacts (TBA). The Best Practical Paper must have an accepted artifact.

Stipends & awards

Students whose papers have been accepted, who will present their talks at the conference, and contact the general chair in a timely fashion will have their registration waived. The primary source of information is the conference website, however, a limited number of stipends are available to those unable to obtain funding to attend the conference. Students, whose papers are accepted and who will present the paper themselves, or from groups who are underrepresented at Asiacrypt at least in the last decade are especially encouraged to apply. Requests for stipends should go to the general chair.

The program chairs may in consultation with the PC choose to bestow two best (theory and practical) paper awards, and a best early-career paper award.
Última Actualización Por Dou Sun en 2025-04-04
Coeficiente de Aceptación
AñoEnviadosAceptadosAceptados(%)
20142555521.6%
20132625521%
20122414317.8%
20112664015%
20102163516.2%
20093004113.7%
20082083315.9%
20072233314.8%
2006303309.9%
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
ICFNNInternational Conference on Frontiers of Neural Networks2019-07-052019-07-152019-07-26
FCST'IEEE International Symposium on Future Cyber Security Technologies2025-03-232025-04-072025-05-19
ICSPACInternational Conference on Security, Pattern Analysis, and Cybernetics2017-08-302017-09-302017-12-15
IConDAInternational Conference on Computer & Drone Applications2019-11-15 2019-12-19
DaMiInternational Conference on Data Mining2024-05-182024-06-112022-08-20
Artificial IntelligenceInternational Conference on Automation and Artificial Intelligence2022-06-012021-11-302020-05-21
ICBDEInternational Conference on Big Data and Education2024-06-252024-07-252024-09-24
RobDAInternational Conference on Robotics: Design and Applications2022-08-202022-09-252023-02-24
aa*a1CRYPTOInternational Cryptology Conference2025-02-132025-05-032025-08-17
CLOUD''International Conference on Cloud Computing2024-08-152024-09-152024-11-16
AbreviaciónNombre CompletoEntregaConferencia
ICFNNInternational Conference on Frontiers of Neural Networks2019-07-052019-07-26
FCST'IEEE International Symposium on Future Cyber Security Technologies2025-03-232025-05-19
ICSPACInternational Conference on Security, Pattern Analysis, and Cybernetics2017-08-302017-12-15
IConDAInternational Conference on Computer & Drone Applications2019-11-152019-12-19
DaMiInternational Conference on Data Mining2024-05-182022-08-20
Artificial IntelligenceInternational Conference on Automation and Artificial Intelligence2022-06-012020-05-21
ICBDEInternational Conference on Big Data and Education2024-06-252024-09-24
RobDAInternational Conference on Robotics: Design and Applications2022-08-202023-02-24
CRYPTOInternational Cryptology Conference2025-02-132025-08-17
CLOUD''International Conference on Cloud Computing2024-08-152024-11-16
Revistas Relacionadas
CCFNombre CompletoFactor de ImpactoEditorISSN
Journal of Robotics1.400Hindawi1687-9600
Journal of Universal Computer ScienceVerlag der Technischen Universitat Graz0948-695x
International Journal of Mobile Learning and OrganisationInderscience1746-725X
Mechanical Systems and Signal Processing7.900Elsevier0888-3270
cPersonal and Ubiquitous ComputingSpringer1617-4909
bTheoretical Computer Science0.900Elsevier0304-3975
International Journal of Distributed Sensor NetworksHindawi1550-1329
Kybernetes2.400Emerald0368-492X
aIEEE/ACM Transactions on Networking3.000IEEE/ACM1063-6692
Journal of Real-Time Image Processing2.900Springer1861-8200
Recomendaciones