Original papers of substantial technical contribution in the areas of cryptology and malicious security are solicited for submission to the International Conference on Cryptology & Malicious Security hosted in Malaysia (Mycrypt 2016).
Note that the first & only Mycrypt thus far was in 2005; even back then it had a dedicated session on unconventional cryptography. Since then, substantial breakthroughs have been made in crypto in the past decade, including notions pertaining to malicious security, i.e. where security is no longer just against bad guys but where good guys who are conventionally viewed as mostly defensive can equally be adversarial. It is now time to rejuvenate the series with particular focus on paradigm-shifting crypto research & thinking outside the current box.
Submissions to Mycrypt 2016 should be aimed towards the following topic categories:
- paradigm-shifting, unconventional cryptology (e.g. malicious crypto, unconventional formulations of underlying problems, or new hard problems)
- position papers on breakthrough cryptologic/security research
- new directions / counter-intuitive / fresh untested ideas (even without concrete realizations)
- revisits/critiques/analysis of long-standing crypto paradigms/approaches/models/formulations (in fact, we also encourage paired submissions by crypto factions of opposing views, where each paper in the pair argues for/against a paradigm)
- revisits/critiques of CRYPTO/Eurocrypt/Asiacrypt/TCC/PKC/FSE/CHES papers (note: responses will be invited from the authors of revisited papers)
- approaches/solutions to long-standing open problems; or formulations of long-standing/thus-far adhoc security approaches
- cryptanalysis of cryptographic schemes/proofs incl attacks beyond existing attack models; invalidation of cryptanalytic attacks and/or invalidation of current attack models
- analysis of crypto/security standardization processes & how they may be subverted
- cryptofications of the real world (e.g. new types of adversarial models and/or notions inspired by real world incidences/problems, modelling humans-in-the-security-loop)
- crypto & beyond: cryptologic techniques in union with techniques from other disciplines
Other aspects of cryptology including conventional cryptology are welcome provided they make substantial contributions to the field of cryptology, to how the world views crypto or how crypto views the world. The gist is that we welcome all things non-conventional & paradigm-shifting.
Instructions for Authors
The submissions must be anonymous with no obvious references.
Submissions must be at most 20 pages excluding references and appendices, and maximally 30 pages in total; and be in 11pt fonts using Springer LNCS format with reasonable margins.
The main part of the paper should be intelligible as reviewers are not required to read the appendices. The introduction should summarize the main contributions of the paper so that it is understandable to a non-expert in cryptography.
Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The PC reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced.
Submissions not meeting these guidelines will be rejected without consideration of their merits.
Submitted papers must be in PDF format and should be submitted electronically via the submission server.
Style of Review Process
We adopt a hybrid journal-like style where there will be two separate & independent calls, each with its own review process. Within each review process will be two stages. After stage 1 (i.e. July 29, 2016 for the Spring Call, or e.g. October 7, 2016 for the Autumn Call), some papers without major issues will be accepted, some papers will be rejected, while others requiring further discussions will proceed to stage 2 and rebuttals will be requested from these authors. The rebuttals will be taken into consideration during the stage 2 of the PC discussion. As soon as revisions & rebuttals are received from authors, discussions among the PC and reviewers will ensue, to be followed by corresponding notifications. Therefore, papers will have different dates of acceptance, and thus the program & accepted papers list will be updated as & when fresh papers are accepted.
Mycrypt 2016 proceedings will be published in Springer’s Lecture Notes in Computer Science (LNCS) series, and will be made available to conference attendees.
Authors of accepted papers must guarantee that their paper will be presented at the conference. The Mycrypt 2016 PC reserves the right to share information about misbehaving authors with other program committees.
Call for Papers:
- Submission deadline
May 31, 2016 (23:59 UTC)
- Early notifications of acceptance/comments from
July 29, 2016
- Rebuttals due from
August 15, 2016
- Remaining notifications of acceptance from
August 31, 2016
Call for Papers:
- Submission deadline
September 15, 2016& October 05, 2016 (23:59 UTC)
- Early notifications from
October 7& October 15, 2016
- Rebuttals due 1 week after notification
- Remaining notifications of acceptance from October 25, 2016
Raphael C.-W. Phan
Multimedia University (MMU), Malaysia
Snapchat & Columbia University, USA