FORTH - Institute of Computer ScienceInternational Association for Cryptologic Research

  Co-operated by:

Call for Papers


Papers offering novel research contributions are solicited for submission to the 13rd International Conference on Cryptology and Network Security. The focus is on original, high quality, unpublished research and implementation experiences. We encourage submissions of papers suggesting novel paradigms, original directions, or non-traditional perspectives.

Submitted papers must not substantially overlap with papers that have been published or that are submitted in parallel to a journal or a conference with formally published proceedings.

Important Dates

  • Submission deadline: June 10, 2014

Extended Deadline (Abstract) June 17th, 23:59 UTC-11
Extended Deadline (Full Submission), June 20nd, 23:59 UTC-11

  • Notification to authors: July 25, 2014
  • Camera-ready version: August 15, 2014

Topics of Interest

  • Access Control for Networks
  • Anonymity & Pseudonymity
  • Attacks & Malicious Code
  • Authentication, Identification
  • Block & Stream Ciphers
  • Cloud Security
  • Cryptographic Algorithms
  • Cryptographic Protocols
  • Denial of Service Protection
  • Embedded Platform Security
  • Hash Functions
  • Identity & Trust Management
  • (Future) Internet Security
  • Key Management
  • Mobile Code Security
  • Multicast Security
  • Network Security
  • Peer-to-Peer Security
  • Public Key Cryptography
  • Security Modeling
  • Security Architectures
  • Security in Location Services
  • Security in Social Networks
  • Sensor Network Security
  • Spam & SPIT Protection
  • Spyware Analysis and Detection
  • Virtual Private Networks
  • Wireless and Mobile Security

Instructions for Authors

The submission should be at most 12 pages, excluding the bibliography and appendices, and at most 16 pages in total. Submitted papers should be intelligible and self-contained without appendices. Papers must be submitted only electronically. The electronic submission site is available at:

Submissions must be anonymous (no author names, affiliations, acknow-ledgments, obvious references). At least one author of every accepted pa-per must register to the conference by the early registration deadline indi-cated by the organizers. Authors have to present their own paper. Papers without a registered author will be removed from the proceedings.

Accepted papers will be published in Springer's Lecture Notes in Com-puter Science (LNCS) and will be available at the conference. Papers should follow the formatting instructions of the Springer LNCS Style (, at the time of submission.