Conference Information
ASIACRYPT 2026: International Conference on the Theory and Application of Cryptology and Information Security
Please Login to view website of conference
Submission Date: |
2026-05-22 |
Notification Date: |
2026-08-14 |
Conference Date: |
2026-12-07 |
Location: |
Hong Kong, China |
Years: |
32 |
CCF: b CORE: a QUALIS: a1 Viewed: 94799 Tracked: 66 Attend: 5
Call For Papers
General information Asiacrypt 2026 will take place in Hong Kong, China on December 7-11, 2026. Asiacrypt 2026 is organized by the International Association for Cryptologic Research (IACR). The proceedings will be published by Springer in the LNCS series. Original research papers on all aspects of cryptology are solicited for submission. As a general IACR conference, we would like to be as inclusive as possible; in particular, a topic for any IACR area conference is a topic for Asiacrypt. The primary source of information is the conference website. Schedule Asiacrypt 2026 will operate a two-round review system with a rebuttal phase. In the first round, the program committee selects a subset of submissions for further consideration in the second round, and the authors receive the first round notification with review comments. The authors of the selected submissions are invited to submit a text-based rebuttal letter to the review comments. In the second round, the program committee further reviews the selected submissions by taking into account their rebuttal letter, and makes the final decision of acceptance or rejection. The submissions that have not been selected during the first round of reviews may be submitted in other conferences after the first round notification date. Artifacts To encourage open and reproducible research, authors of accepted papers will be invited to submit artifacts associated with their papers, such as software or datasets, for review. The artifact review will be a collaborative process between authors and the artifact review committee. The goal of the process is not just to evaluate artifacts, but also to improve them for reproduction and reusability by the scientific community. Artifacts that pass successfully through the artifact review process will be archived on the IACR artifact archive. Please see the detailed call for artifacts, which will be linked here when available. Stipends Students whose papers have been accepted and who present their talks at the conference will have their registration waived. A limited number of stipends are available to those unable to obtain funding to attend the conference. Students, whose papers are accepted and who will present the paper themselves, are encouraged to apply if such assistance is needed. Requests for stipends should be sent to the general co-chairs.
Last updated by Dou Sun in 2026-04-29
Acceptance Ratio
| Year | Submitted | Accepted | Accepted(%) |
|---|---|---|---|
| 2014 | 255 | 55 | 21.6% |
| 2013 | 262 | 55 | 21% |
| 2012 | 241 | 43 | 17.8% |
| 2011 | 266 | 40 | 15% |
| 2010 | 216 | 35 | 16.2% |
| 2009 | 300 | 41 | 13.7% |
| 2008 | 208 | 33 | 15.9% |
| 2007 | 223 | 33 | 14.8% |
| 2006 | 303 | 30 | 9.9% |
Best Papers
Related Conferences
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Journal of the Association of Information Systems | 7.0 | Association for Information Systems | 1536-9323 | |
| Engineering Applications of Computational Fluid Mechanics | 5.4 | Taylor & Francis | 1994-2060 | |
| Education and Information Technologies | 5.4 | Springer | 1360-2357 | |
| Journal of Chemical Information and Modeling | 5.3 | American Chemical Society | 1549-9596 | |
| c | International Journal of Geographical Information Science | 5.1 | Taylor & Francis | 1365-8816 |
| Journal of the Association for Information Science and Technology | 4.3 | John Wiley & Sons | 2330-1643 | |
| International Journal of Information Security | 3.2 | Springer | 1615-5262 | |
| ACM Journal of Data and Information Quality | 2.9 | ACM | 1936-1955 | |
| c | EURASIP Journal on Information Security | 2.1 | Springer | 1687-417X |
| c | IET Information Security | 1.4 | IET | 1751-8709 |