Submission Deadline: Friday 27 May 2022
Conference Dates: Dec 05, 2022 - Dec 09, 2022
The conference aims to foster the development of research in Theoretical computer science, Cryptography, Discrete mathematics, Algorithm and Computer security. The event holds forums on Theoretical computer science that merges themes from other disciplines such as Random oracle, Encryption, Public-key cryptography, Hash function and Scheme (programming language). The studies in Random oracle featured incorporate elements of Mathematical proof, Standard model (cryptography) and Oracle.
Topics in Public-key cryptography were tackled in line with various other fields like Communication complexity and Digital signature. The study on Cryptography featured in it expounds on the topic of Cryptosystem in particular. The event explores issues in Discrete mathematics which can be linked to other research areas like Combinatorics, Elliptic curve, Discrete logarithm, Security parameter and Polynomial.
The studies tackled, which mainly focus on Algorithm, apply to Signature (logic) as well. Key (cryptography) and Adversary are among the areas of Computer security tackled. In addition to Probabilistic encryption research, the event aims to explore topics under Multiple encryption and 40-bit encryption.
The conference publications generally zeroe in on subjects such as Theoretical computer science, Cryptography, Computer security, Random oracle and Public-key cryptography. While Theoretical computer science is the focus of the most cited publications, it also provides insights into the studies of Homomorphic encryption, Ciphertext, Key (cryptography), Encryption and Algorithm. In addition to Algorithm research, the most cited publications aim to explore topics under Discrete mathematics and Hash function.
Lattice (order), NTRUSign, Cryptanalysis, Algorithm and Masking (art) are the subjects of interest in International Conference on the Theory and Application of Cryptology and Information Security. It tackles research in Masking (art) and various other disciplines, including Embedded system, Software and Superscalar.
A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.
The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.
The top authors publishing at International Conference on the Theory and Application of Cryptology and Information Security (based on the number of publications) are:
The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.
Only papers with recognized affiliations are considered
The top affiliations publishing at International Conference on the Theory and Application of Cryptology and Information Security (based on the number of publications) are:
The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.
The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.
The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.
During the most recent 2021 edition, 25.00% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 33.33% were posted by at least one author from the top 10 institutions publishing at the conference. Another 0.00% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 33.33% of all publications and 33.33% were from other institutions.
A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.
The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.
The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.
Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).
The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:
The chart below illustrates experience levels of first authors in cases of publications with multiple authors.
Jun 25, 2023 - Jun 30, 2023
Deadline: Sunday 22 Jan 2023
Dec 05, 2021 - Dec 05, 2021
Dec 05, 2022 - Dec 09, 2022
28th Annual International Conference on the Theory and Application of Cryptology and Information Security
Thank you for information!