Communications in Cryptology IACR CiC

How to submit a paper

Submission to the first issue of 2024 is not open yet.


There are six areas defined for the 2024 issues, each with their own chair. In case you do not find any area for your paper choose the one you consider nearest or contact the Editors-in-Chief.

Public-Key Cryptology
(chair: Paulo L. Barreto)

Design and analysis of all aspects of public-key cryptography. This includes classic or post-quantum public-key cryptographic schemes, the cryptanalysis of underlying hardness assumptions against conventional and quantum adversaries, as well as security proofs considering conventional and quantum adversaries.

Symmetric-Key Cryptology
(chair: Yu Sasaki)

Design and analysis of all aspects of symmetric cryptography: this includes block ciphers, stream ciphers, encryption schemes, hash functions, message authentication codes, cryptographic permutations and authenticated encryption schemes as well as cryptanalysis and security proofs considering conventional and quantum adversaries.

Theoretical Foundations
(chair: Kai-Min Chung)

Paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural and fundamental cryptographic problems, including the study of known paradigms and the discovery of new ones, the formulation of new cryptographic problems, the study of information-theoretic concepts relevant to cryptology, and the complexity-theoretic study of hardness assumptions.

Cryptographic Engineering
(chair: Sonia Belaïd)

The design, optimization and analysis of hardware and software implementations of (advanced) cryptographic approaches and research in cryptographic engineering. This includes the study of practical attacks against implementations, including side-channel attacks, fault attacks, and micro-architectural attacks, as well as countermeasures and formal verification of any of the aforementioned techniques.

Advanced Primitives
(chair: Nigel P. Smart)

The design and study of advanced cryptographic concepts: this includes homomorphic encryption, multi-party computation, functional encryption and (hierarchical) identity based encryption schemes, similarly enriched signature schemes, obfuscation and multilinear maps.

Real World Attacks & Applications
(chair: Nadia Heninger)

The design of cryptographic solutions to real-world use-cases and their cryptanalysis. This includes (but is not limited to) cryptographic real-world protocols such as secure communication protocols, voting protocols, or secure messaging, as well as real world applications of advanced primitives like MPC or FHE, where one could present models to formalize security of such protocols, security proofs, and tools to verify their security as well as attacks on real-world deployed systems, from hacking cars to cold-boot attacks to downgrade attacks.