Conference Information
C2SI 2023: International Conference on Codes, Cryptology and Information Security
http://www.c2si-conference.org/Submission Date: |
2022-12-30 |
Notification Date: |
2023-02-20 |
Conference Date: |
2023-05-29 |
Location: |
Rabat, Morocco |
Years: |
4 |
Viewed: 10387 Tracked: 3 Attend: 0
Call For Papers
Objective
The fourth International Conference on Codes, Cryptology and Information Security (C2SI-2023). aims to bring together researchers in coding theory, cryptology and information security, practitioners, developers, and users to foster cooperation, and exchange techniques, tools, experiences and ideas. It also aims to increase the pool of early career researchers who appreciate the power of math- ematics and its important role in communications engineering and to help them understand the different cultures associated with mathematics and engineering. Also, to identify new research directions in the mathematics and computer science of communications, especially involving a crucial interplay between theory and applications.
Instructions and information for submission
The submissions should contain original, high-quality, unpublished research results of theoretical and practical impact, including concepts, techniques, applications and practical experiences in the following fields from academia, government, and industry presenting novel research. Submission to C2SI-2023 must be original and not sub- stantially duplicate work that has been published or is simultaneously submitted to a journal or another conference/workshop with proceedings. Papers that contain any form of plagiarism or self-plagiarism will be rejected without reviews. Supplementary materials that facilitate verification of the results, e.g. source code, proof details, etc., may be appended without a page limit or uploaded as separate files, but reviewers are neither required to read them nor will they be printed in the proceedings. Submissions must be anonymous with no author names, affiliations, acknowledgments, or obvious references. All submissions will be blind-refereed. All papers must be written in English, must be processed with LaTeX, complete, intelligible and self-contained within at most 20 pages in Springer’s Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. Information about the Springer LNCS format can be found here. Papers must be submitted electronically in PDF format via Easychair.
Scope: All topics in Coding theory, Cryptography, security and related topics and as- pects. See a non-exhaustive list below.
Topics of Interest
Areas of interest include, but are not limited to:
Error-correcting codes
Code-based Cryptography
Artificial Intelligence in Security
Cryptographic protocols
Post-quantum cryptography
Privacy, identification and authentication
Key management
Data & System Integrity
Identity-based encryption (IBE)
Lattice-Based Cryptography
Signature
Random and pseudorandom generators
Boolean Functions in cryptography
Access Control and Intrusion Detection
Wireless Mobile Ad Hoc Network Security
Security in Distributed Systems
Secure Cloud Computing
Blockchain Security and Privacy
Smart cards Security
RFID security
Intrusion Detection & Prevention
Identity and Security in IoT
Security and Privacy for Big Data
Mobile Security
Information Hiding, Fingerprinting
Steganography
Watermarking
Malware Analysis and Detection
Attacks & Malicious Code
The design and analysis of primitives in symmetric cryptography
Discrete structures in symmetric cryptography
Theoretical approaches and practical aspects in coding theory
Quantum attacks on symmetric and asymmetric schemes
Last updated by Dou Sun in 2022-10-06
Related Conferences
| Short | Full Name | Conference |
|---|---|---|
| ISKE | International Conference on Intelligent Systems and Knowledge Engineering | 2015-11-24 |
| AISTATS | International Conference on Artificial Intelligence and Statistics | 2026-05-02 |
| ICIDS | International Conference on Interactive Digital Storytelling | 2015-11-30 |
| HCII | International Conference on Human-Computer Interaction | 2016-07-17 |
| IFIPTM | IFIP WG 11.11 International Conference on Trust Management | 2019-07-17 |
| RoboCom | International Workshop on Communication and Networking for Swarms Robotics | 2025-01-10 |
| RDAAPS | Reconciling Data Analytics, Automation, Privacy, and Security | 2021-05-17 |
| ACSAC | Annual Computer Security Applications Conference | 2025-12-09 |
| SOENG | International Conference on Software Engineering | 2022-08-20 |
| BDET | International Conference on Big Data Engineering and Technology | 2022-04-22 |
Related Journals
| CCF | Full Name | Impact Factor | Publisher | ISSN |
|---|---|---|---|---|
| Optical Memory and Neural Networks | 1.000 | Springer | 1060-992X | |
| b | IEEE Transactions on VLSI Systems | 2.800 | IEEE | 1063-8210 |
| International Journal of Distributed Sensor Networks | Hindawi | 1550-1329 | ||
| VLSI Design | Hindawi | 1065-514X | ||
| Computational Statistics | 1.000 | Springer | 0943-4062 | |
| International Journal of Systems Science: Operations & Logistics | Taylor & Francis | 2330-2674 | ||
| a | IEEE/ACM Transactions on Networking | 3.000 | IEEE/ACM | 1063-6692 |
| Advances in Acoustics and Vibration | Hindawi | 1687-6261 | ||
| Journal of Molecular Graphics and Modelling | 2.700 | Elsevier | 1093-3263 |
| Full Name | Impact Factor | Publisher |
|---|---|---|
| Optical Memory and Neural Networks | 1.000 | Springer |
| IEEE Transactions on VLSI Systems | 2.800 | IEEE |
| International Journal of Distributed Sensor Networks | Hindawi | |
| VLSI Design | Hindawi | |
| Computational Statistics | 1.000 | Springer |
| International Journal of Systems Science: Operations & Logistics | Taylor & Francis | |
| IEEE/ACM Transactions on Networking | 3.000 | IEEE/ACM |
| Advances in Acoustics and Vibration | Hindawi | |
| Journal of Molecular Graphics and Modelling | 2.700 | Elsevier |