Original papers on cryptanalysis and/or attacks on schemes/systems/proofs/processes, or on invalidations of existing cryptanalysis/attacks, are solicited for submission to a Special Track on *Cryptanalysis Correspondence*, as part of the technical program of Mycrypt 2016.
While any types of cryptanalysis and/or attack results are welcome, submissions may even include the following:
- improvements to data/time/space complexities for specific scheme parameters,
- demonstration of the impracticality of existing attack model(s),
- potential attacks beyond (& accompanied with justifications on limitations of) existing attack model(s),
- invalidation of published cryptanalysis results, or showing flaws in existing cryptanalysis/attacks,
- or a collection of random observations/properties that might potentially be exploited.
In addition to reviews by PC members & reviewers, upon acceptance the authors of the scheme/system/proof being cryptanalyzed/attacked will be invited to provide a response, to which the submission can rebut in its revised/camera-ready version. Technically competent responses may be included as an appendix.
Instructions for Authors
The submissions must be anonymous with no obvious references.
Submissions must be at most 12 pages excluding references and appendices, and maximally 20 pages in total; and be in 11pt fonts using Springer LNCS format with reasonable margins. Depending on the results presented, PC members and reviewers may suggest to revise (up/down) the max number of pages.
The main part of the paper should be intelligible as reviewers are not required to read the appendices. The introduction should summarize the main contributions of the paper so that it is understandable to a non-expert in cryptography.
Submissions must not substantially duplicate work that any of the authors has published in a journal or a conference/workshop with proceedings, or has submitted/is planning to submit before the author notification deadline to a journal or other conferences/workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. The PC reserves the right to share information about submissions with other program committees to detect parallel submissions and the IACR policy on irregular submissions will be strictly enforced.
Submissions not meeting these guidelines will be rejected without consideration of their merits.
Submitted papers must be in PDF format and should be submitted electronically via the submission server.
The reviewing process will involve two stages. After stage 1 (October 7, 2016), some papers without major issues will be accepted, at which point the authors of the cryptanalyzed/attacked scheme/system/proof will be invited to give a response, to which the submission can rebut in its revised/camera-ready version.
Some papers will be rejected, while others requiring further discussions will proceed to stage 2 and rebuttals will be requested from these authors. Authors may also opt for the PC to invite the original authors of the cryptanalyzed/attacked scheme/system/proof to give a response. The rebuttals and/or responses will be taken into consideration during the stage 2 of the PC discussion.
All accepted papers of this *Cryptanalysis Correspondence* Track will be published in Springer’s Lecture Notes in Computer Science (LNCS) series, and will be made available to conference attendees.
Authors of accepted papers must guarantee that their paper will be presented at the conference. The Mycrypt 2016 PC reserves the right to share information about misbehaving authors with other program committees.
- Submission deadline
September 15, 2016& October 05, 2016 (23:59 UTC)
- Early notifications from
October 7& October 15, 2016
- Rebuttals due 1 week after notification
- Remaining notifications of acceptance from October 25, 2016
Raphael C.-W. Phan
Multimedia University (MMU), Malaysia
Snapchat & Columbia University, USA