Call for Papers

Paper Submission

Important dates

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

Conference dates

Late Track

Full Paper Submission deadline

Notification deadline

Camera-ready deadline

The AC3 conference intends to bring together researchers and practitioners from all areas of applied cryptography in computer and communication systems. The conference encourages submissions on all technical aspects of applied cryptography, including but not limited to cryptographic algorithms, protocols, implementations, standards and practices, and applications of cryptography in computer, information, and system security. We encourage submissions on the utilization of cryptographic technologies to solve security problems in the real-world systems, including cloud services, the Internet of Things, cyber-physical systems, distributed systems, edge computing, information-centric networks, databases, data centers, etc.

We solicit submissions of original research papers on a wide range of applied cryptography and cryptographic engineering, including but not limited to, the following topics:

    • Authenticated Encryption
    • Hash Functions and MACs
    • Provable Security
    • Public Key Encryption
    • Digital Signatures
    • Key Exchange/Agreement
    • Searchable Encryption
    • Key Management
    • Cryptographic Protocols
    • Multiparty Secure Computation
    • Financial Cryptography
    • Cryptographic Implementations
    • Post-Quantum Cryptography
    • Side Channel Attacks and Prevention
    • Anonymity and Privacy-Enhancing
    • Authentication and Identity Management
    • Data Protection
    • Database Security
    • Digital Rights Management
    • Trust Management
    • Trusted Hardware and Cryptographic Hardware
    • Applied Cryptography in Blockchain
    • Applied Cryptography in IoT/CPS
    • Applied Cryptography in Clouds
    • Applied Cryptography in Mobile Systems
    • Applied Cryptography in VANET
    • Applied Cryptography in Information-Centric Networks
    • Applied Cryptography in Edge Computing
    • Applied cryptography in Big Data and Artificial Intelligence

All registered papers will be submitted for publishing by Springer and made available through SpringerLink Digital Library.

Proceedings will be submitted for inclusion in leading indexing services, Ei Compendex, Web of Science, Scopus, CrossRef, Google Scholar, DBLP, as well as EAI’s own EU Digital Library (EUDL).

Authors of selected papers will be invited to submit an extended version to:

 
How to Submit a Paper in Confy:
  1. Go to Confy+ website.
  2. Log in or sign up as a new user.
  3. Select your desired track.
  4. Click the ‘Submit Paper’ link within the track and follow the instructions.

Alternatively, go to the Confy+ homepage and click on “Open Conferences.”

Submission Guidelines:

  • All papers must be submitted in English. 
  • Previously published work cannot be submitted, nor can it be concurrently submitted to any other conference or journal. These papers will be rejected without review. 
  • Papers must follow the Springer formatting guidelines (available in the Author’s Kit section). 
  • Authors must read and agree to the Publication Ethics and Malpractice Statement.
  • As per new EU accessibility requirements, going forward, all figures, illustrations, tables, and images should have descriptive text accompanying them. Please refer to the document below, which will assist you in crafting Alternative Text (Alt Text)

HOW TO WRITE GOOD ALT TEXT

Papers should be submitted through EAI ‘Confy+‘ system, and have to comply with the Springer format (see Author’s kit section).

  • Regular papers should be up to 12-30 pages in length.
  • Short papers should be 6-11 pages in length.

All conference papers undergo a thorough peer review process prior to the final decision and publication. This process is facilitated by experts in the Technical Program Committee during a dedicated conference period. Standard peer review is enhanced by EAI Community Review which allows EAI members to bid to review specific papers. All review assignments are ultimately decided by the responsible Technical Program Committee Members while the Technical Program Committee Chair is responsible for the final acceptance selection. You can learn more about Community Review here.

Papers must be formatted using the Springer LNICST Authors’ Kit.

Instructions and templates are available from Springer’s LNICST homepage:

Please make sure that your paper adheres to the format as specified in the instructions and templates.

When uploading the camera-ready copy of your paper, please be sure to upload both:

  • a PDF copy of your paper formatted according to the above templates, and
  • an archive file (e.g. zip, tar.gz) containing the both a PDF copy of your paper and LaTeX or Word source material prepared according to the above guidelines.
Scroll to Top