The Thirteenth Conference on Security and Cryptography for Networks (SCN 2022) aims to bring together researchers in the field of cryptography and information security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas. The conference seeks submissions from academia, government, and industry presenting novel research on all practical and theoretical aspects of cryptography and information security. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences. Submitted papers must not substantially overlap with papers that have been published or that are simultaneously submitted to a journal or a conference/workshop with proceedings.
All topic areas related to cryptography and information security are of interest and in scope. Suggested topics include but are not restricted to:
- Anonymity and Privacy
- Applied Cryptography and Implementations
- Authentication, Identification and Access Control
- Block and Stream Ciphers
- Complexity-Theoretic Cryptography
- Cryptocurrencies and Blockchain
- Cryptographic Hash Functions
- Cryptographic Protocols
- Digital Signatures and Message Authentication Codes
- Distributed Systems Security
- Elliptic-Curve Cryptography
- Formal Security Methods
- Information-Theoretic Security
- Post-quantum Cryptography
- Public-Key Encryption
- Physical Cryptography
Authors are invited to submit electronically (PDF format) a non-anonymous extended abstract.
We strongly encourage to typeset the extended abstract using Springer’s LNCS LaTeX package with no changes to the style. Springer encourages authors to include their ORCIDs in the final published versions of their papers. See Springer Lecture Notes in Computer Science instructions for authors.
The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. The length of the submission should be at most 24 pages, including bibliography but excluding clearly marked appendices. Within these 24 pages, the submission should clearly indicate the results achieved, their significance, and their relation to other work in the area. Referees are not required to read appendices; the paper should be intelligible without them. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to a journal or to any other conference or workshop with proceedings.
Submissions deviating significantly from these guidelines risk rejection without consideration of their merits. All submissions will be treated as confidential, and will only be disclosed to the committee and their chosen sub-referees.
The intention of the organisers is to hold a physical event.
However, the SCN may switch to a hybrid/virtual mode whenever required by the National or local authorities or if deemed necessary.
Authors of accepted papers must guarantee that their paper will be presented at the conference. In any case, speakers who may not feel comfortable in travelling at the time of the conference will be able to present their work remotely.
Proceedings and Special Issue
Conference Proceedings will be published by Springer in the Lecture Notes in Computer Science series.
A Special Issue of Information and Computation will be devoted to a selection of accepted papers from SCN 22.
Dates and Deadlines
|Submission:||May 1, 2022 23:59 AoE |
|Notification to authors:||June 17, 2022 |
|Camera-Ready Version:||July 1, 2022 |
|Early Registration:||July 31, 2022|
|Late Registration:||September 2, 2022|
|Conference:||September 12-14, 2022|
Stanislaw Jarecki, University of California, Irvine, USA
Masayuki Abe, NTT Secure Platform Laboratories, Japan
Manuel Barbosa, University of Porto and INESC TEC, Portugal
Dario Catalano, Università di Catania, Italy
Geoffroy Couteau, CNRS, IRIF, Université de Paris, France
Jintai Ding, University of Cincinnati, USA
Juan Garay, Texas A&M University, USA
Niv Gilboa, Ben Gurion University, Israel
Julia Hesse, IBM Research Zurich, Switzerland
Harish Karthikeyan, New York University, USA
Aggelos Kiaiyas, University of Edinburgh, UK
Russell W. F. Lai, Friedrich-Alexander University Erlangen-Nuremberg, Germany
Steve Lu, Stealth Software Technologies, USA
Tal Malkin, Columbia University, USA
Chan Nam Ngo, Kyber Network, Vietnam
Omkant Pandey, Stony Brook University, USA
Giuseppe Persiano, Università di Salerno, Italy
Krzysztof Pietrzak, IST Austria
Antigoni Polychroniadou, J.P. Morgan AI Research, USA
Mike Rosulek, Oregon State University, USA
Arnab Roy, University of Klagenfurt, Austria
Alessandra Scafuro, North Carolina State University, USA
Dominique Schröder, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Yannick Seurin, ANSSI, France
Abhi Shelat, Northeastern University, USA
Nigel Smart, COSIC, KU Leuven, Belgium
Martijn Stam, Simula UiB, Norway
Mehdi Tibouchi, NTT Corporation, Japan
Daniele Venturi, Sapienza University of Rome, Italy
Damien Vergnaud, Sorbonne Université, France
Jiayu Xu, Algorand Foundation, USA
Sophia Yakoubov, Aarhus University, Denmark
Vassilis Zikas, Purdue University, USA
Clemente Galdi, University of Salerno, Italy
Luigi Catuogno, University of Salerno, Italy
Giuseppe Fenza, University of Salerno, Italy
Barbara Masucci, University of Salerno, Italy
Francesco Orciuoli, University of Salerno, Italy
Alberto Volpe, University of Salerno, Italy
Rocco Zaccagnino, University of Salerno, Italy
Carlo Blundo, Università di Salerno, Italy
Alfredo De Santis, Università di Salerno, Italy
Ueli Maurer, ETH Zurich, Switzerland
Rafail Ostrovsky, University of California – Los Angeles, USA
Giuseppe Persiano, Università di Salerno, Italy
Jacques Stern, ENS Paris, France
Gene Tsudik, University of California – Irvine, USA
Moti Yung, Google, USA