Ranking & Metrics Conference Call for Papers Other Conferences in United States
28th Annual International Conference on the Theory and Application of Cryptology and Information Security

28th Annual International Conference on the Theory and Application of Cryptology and Information Security

Taipei, Taiwan

Submission Deadline: Friday 27 May 2022

Conference Dates: Dec 05, 2022 - Dec 09, 2022

Research
Impact Score 4.10

OFFICIAL WEBSITE

Conference Organizers: Deadline extended?
Click here to edit

Ranking & Metrics Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.

Research Impact Score: 4.10
Contributing Best Scientists: 61
H5-index:
Papers published by Best Scientists 62
Research Ranking (Computer Science) 121

Conference Call for Papers

Asiacrypt 2022 will operate a two-round review system with rebuttal phase. In the first round, the program committee selects a subset of submissions for further consideration in the second round, and the authors receive the first round notification with review comments. The authors of the selected submissions are invited to submit a text-based rebuttal letter to the review comments.

The submissions that have not been selected during the first round of reviews may be submitted in other conferences after the first round notification date.

In the second round the program committee further reviews the selected submissions by taking into account their rebuttal letter. They then make the final decision of acceptance or rejection.

Overview

Top Research Topics at International Conference on the Theory and Application of Cryptology and Information Security?

  • Theoretical computer science (38.29%)
  • Cryptography (23.63%)
  • Discrete mathematics (23.19%)

The conference aims to foster the development of research in Theoretical computer science, Cryptography, Discrete mathematics, Algorithm and Computer security. The event holds forums on Theoretical computer science that merges themes from other disciplines such as Random oracle, Encryption, Public-key cryptography, Hash function and Scheme (programming language). The studies in Random oracle featured incorporate elements of Mathematical proof, Standard model (cryptography) and Oracle.

Topics in Public-key cryptography were tackled in line with various other fields like Communication complexity and Digital signature. The study on Cryptography featured in it expounds on the topic of Cryptosystem in particular. The event explores issues in Discrete mathematics which can be linked to other research areas like Combinatorics, Elliptic curve, Discrete logarithm, Security parameter and Polynomial.

The studies tackled, which mainly focus on Algorithm, apply to Signature (logic) as well. Key (cryptography) and Adversary are among the areas of Computer security tackled. In addition to Probabilistic encryption research, the event aims to explore topics under Multiple encryption and 40-bit encryption.

What are the most cited papers published at the conference?

  • Short Signatures from the Weil Pairing (2262 citations)
  • Certificateless Public Key Cryptography (1527 citations)
  • How to Leak a Secret (1214 citations)

Research areas of the most cited articles at International Conference on the Theory and Application of Cryptology and Information Security:

The conference publications generally zeroe in on subjects such as Theoretical computer science, Cryptography, Computer security, Random oracle and Public-key cryptography. While Theoretical computer science is the focus of the most cited publications, it also provides insights into the studies of Homomorphic encryption, Ciphertext, Key (cryptography), Encryption and Algorithm. In addition to Algorithm research, the most cited publications aim to explore topics under Discrete mathematics and Hash function.

What topics the last edition of the conference is best known for?

  • Cryptography
  • Programming language
  • Algorithm

The previous edition focused in particular on these issues:

Lattice (order), NTRUSign, Cryptanalysis, Algorithm and Masking (art) are the subjects of interest in International Conference on the Theory and Application of Cryptology and Information Security. It tackles research in Masking (art) and various other disciplines, including Embedded system, Software and Superscalar.

The most cited articles from the last conference are:

  • Learning Strikes Again: The Case of the DRS Signature Scheme (4 citations)
  • Compressed Sigma-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures (0 citations)
  • Secure and Efficient Software Masking on Superscalar Pipelined Processors (0 citations)

Papers citation over time

A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.

The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.

Research.com

The top authors publishing at International Conference on the Theory and Application of Cryptology and Information Security (based on the number of publications) are:

  • Yu Sasaki (17 papers) absent at the last edition,
  • Mihir Bellare (15 papers) absent at the last edition,
  • Dan Boneh (13 papers) absent at the last edition,
  • Thomas Peyrin (13 papers) absent at the last edition,
  • David Pointcheval (12 papers) absent at the last edition.

The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.

Research.com

Only papers with recognized affiliations are considered

The top affiliations publishing at International Conference on the Theory and Application of Cryptology and Information Security (based on the number of publications) are:

  • École Normale Supérieure (43 papers) absent at the last edition,
  • Katholieke Universiteit Leuven (36 papers) absent at the last edition,
  • Aarhus University (31 papers) published 1 paper at the last edition, 3 less than at the previous edition,
  • Microsoft (30 papers) absent at the last edition,
  • Ruhr University Bochum (28 papers) absent at the last edition.

The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.

Research.com

Publication chance based on affiliation

The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.

The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.

Research.com

During the most recent 2021 edition, 25.00% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 33.33% were posted by at least one author from the top 10 institutions publishing at the conference. Another 0.00% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 33.33% of all publications and 33.33% were from other institutions.

Returning Authors Index

A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.

The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.

Research.com

Returning Institution Index

The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.

Research.com

The experience to innovation index

Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).

The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:

  • Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
  • Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
  • Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
  • Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
  • Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).

Research.com

The chart below illustrates experience levels of first authors in cases of publications with multiple authors.

Research.com

Other Conferences in Taiwan

IEEE International Symposium on Information Theory

Jun 25, 2023 - Jun 30, 2023

Taipei, Taiwan

Deadline: Sunday 22 Jan 2023

Previous Editions

Something went wrong. Please try again later.