Due to unadaptability of the style sheet with the browser used in your computer, pages may not look as original.
Even in such a case, however, the contents can be used safely.
Original research papers pertaining to all aspects cryptography are solicited. Topics include but are not limited to:
Submission Deadline : September 7, 2015 — 23:59 PDT (UTC-7)
Notification : November 12, 2015
Final Version of the Paper : November 26, 2015
All papers accepted for presentation will appear in the conference proceedings published in Lecture Notes in Computer Science. Authors of accepted papers must make their paper available online.
All submissions should be uploaded to [https://easychair.org/conferences/?conf=ctrsa2016] in pdf format by the September 7 deadline.
Submissions must not substantially duplicate work that any of the authors has published in a journal or in a conference or workshop with proceedings, or has submitted or is planning to submit before the author notification deadline to a journal or other conferences or workshops that have proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings.
Submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. Each should begin with a title, a short abstract, and a list of keywords. Submissions should be at most 16 pages including the bibliography and should use the Springer LNCS format with no changes to the margins or fonts. Supplementary materials may be appended without a page limit, but reviewers are not required to read them. Submissions should be intelligible and self-contained within the 16 page bound. The same bound will be applied to those papers accepted for publication in the proceedings. Submissions not meeting these guidelines risk rejection without consideration of their merits.
Authors should report any “conflicts” with program committee members listed below. A conflict exists if an author and committee member have the same affiliation or have been co-authors on a paper within the past two years.
Frederik Armknecht, University of Mannheim, Germany
Nuttapong Attrapadung, AIST, Japan
Josh Benaloh, Microsoft Research, USA
Melissa Chase, Microsoft Research, USA
Chen-Mou Cheng, National Taiwan University, Taiwan
Jung Hee Cheon, Seoul National University, Korea
Jean-Sebastien Coron, University of Luxembourg, Luxembourg
Pooya Farshim, Queen's University Belfast, UK
Shai Halevi, IBM T.J. Watson Research Center, USA
Helena Handschuh, Cryptography Research, Inc., USA
Hüseyin Hışıl, Yasar University, Turkey
Thomas Johansson, Lund University, Sweden
Marc Joye, Technicolor, USA
Ghassan Karame, NEC Laboratories Europe, Germany
Nathan Keller, Bar Ilan University, Israel
Vladimir Kolesnikov, Bell Labs Alcatel-Lucent, USA
Susan Langford, Hewlett-Packard Company, USA
Dongdai Lin, Chinese Academy of Sciences, China
Stefan Mangard, Graz University of Technology, Austria
Tal Moran, IDC Herzliya, Israel
Maria Naya-Plasencia, Inria, France
Kaisa Nyberg, Aalto University School of Science, Finland
Satoshi Obana, Hosei University, Japan
Kazue Sako (Chair), NEC, Japan
Palash Sarkar, Indian Statistical Institute, India
Yu Sasaki, NTT, Japan
Ali Aydin Selcuk, TOBB University of Economics and Technology, Turkey
abhi shelat, University of Virginia, USA
Nigel Smart, University of Bristol, UK
Marc Stevens, CWI, Netherlands
Willy Susilo, University of Wollongong, Australia
Dominique Unruh, University of Tartu, Estonia
Huaxiong Wang, Nanyang Technological University, Singapore