Ranking & Metrics
Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.
Research Impact Score:0.70
Contributing Best Scientists:3
H5-index:
Papers published by Best Scientists5
Research Ranking (Computer Science)52
Research Ranking (Mathematics)24
Research Ranking (Mathematics)37
Research Ranking (Computer Science)88
Conference Call for Papers
Eurocrypt 2022, the 41st Annual International Conference on the Theory and Applications of Cryptology and Information Security, will take place in Trondheim, Norway. The conference is organized by the International Association for Cryptologic Research (IACR). Original research papers are welcomed on any cryptographic topic, including but not limited to:
foundational theory and mathematics
the design, proposal, and analysis of cryptographic primitives and protocols
secure implementation and optimization in hardware or software
applied aspects of cryptography
If your research fits any of the IACR’s area conferences or symposium: CHES, FSE, PKC, RWC, or TCC, then your contribution fits the scope of Eurocrypt.
Overview
Top Research Topics at Theory and Application of Cryptographic Techniques?
Theoretical computer science (30.81%)
Discrete mathematics (28.02%)
Cryptography (22.26%)
The conference is organized to address concerns in the fields of Theoretical computer science, Discrete mathematics, Cryptography, Computer security and Encryption.
The event facilitates discussions on Theoretical computer science that incorporate concepts from other fields like Mathematical proof, Random oracle, Hash function, Scheme (programming language) and Computation.
Zero-knowledge proof is part of Mathematical proof studies tackled in the conference.
It encompasses presentations on Hash function, specifically Collision resistance, SHA-2, Double hashing and Cryptographic hash function.
The Discrete mathematics works featured in the event incorporate elements from Combinatorics, Discrete logarithm, Function (mathematics), Algebra and Upper and lower bounds.
While the event focused on Cryptography, it was also able to explore topics like Authentication and Public-key cryptography.
Theory and Application of Cryptographic Techniques explores research in Computer security and the adjacent study of Protocol (object-oriented programming).
Theory and Application of Cryptographic Techniques tackles issues in Encryption, particularly in the topics of Probabilistic encryption, Ciphertext and Homomorphic encryption.
Cryptanalysis and Stream cipher are Algorithm topics of special interest in Theory and Application of Cryptographic Techniques.
What are the most cited papers published at the conference?
Public-key cryptosystems based on composite degree residuosity classes (5070 citations)
Fuzzy identity-based encryption (3111 citations)
Public Key Encryption with Keyword Search (2289 citations)
Research areas of the most cited articles at Theory and Application of Cryptographic Techniques:
The main points discussed in the most cited articles deal with Theoretical computer science, Cryptography, Computer security, Discrete mathematics and Encryption.
The published papers tackle studies in Cryptosystem and the interrelated subject of Semantic security to gain insights into Theoretical computer science.
The conference articles explore issues in Cryptography which can be linked to other research areas like Random oracle, Public-key cryptography and Authentication.
What topics the last edition of the conference is best known for?
Cryptography
Algorithm
Algebra
The previous edition focused in particular on these issues:
Theoretical computer science, Discrete mathematics, Computer security, Computation and Encryption are among the topics commonly tackled in the conference.
The research on Theoretical computer science presented in it often intersects with areas of study such as
Protocol (object-oriented programming) which is related to area like Communication complexity,
Cryptography that intertwine with fields like Computer network..
The tackled Discrete mathematics research is interrelated with Mathematical proof which concerns subjects like Symmetric-key algorithm.
The majority of Encryption studies presented zero in on Ciphertext.
Theory and Application of Cryptographic Techniques explores research in Ciphertext alongside concepts in Plaintext and other areas of study in Algorithm.
In it, Lattice (order) and Public-key cryptography are investigated in conjunction with one another to address concerns in Algorithm research.
The most cited articles from the last conference are:
Distributed Differential Privacy via Shuffling (73 citations)
Aurora: Transparent Succinct Arguments for R1CS (72 citations)
The General Sieve Kernel and New Records in Lattice Reduction (55 citations)
Papers citation over time
A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.
The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.
Research.com
Top authors and change over time
The top authors publishing at Theory and Application of Cryptographic Techniques (based on the number of publications) are:
Amit Sahai (13 papers) published 2 papers at the last edition, 2 less than at the previous edition,
Yuval Ishai (8 papers) absent at the last edition,
Sebastian Faust (7 papers) published 1 paper at the last edition the same number as at the previous edition,
Hoeteck Wee (7 papers) published 1 paper at the last edition,
Vinod Vaikuntanathan (6 papers) published 1 paper at the last edition the same number as at the previous edition.
The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.
Research.com
Top affiliations and change over time
Only papers with recognized affiliations are considered
The top affiliations publishing at Theory and Application of Cryptographic Techniques (based on the number of publications) are:
University of California, Los Angeles (22 papers) published 4 papers at the last edition, 3 less than at the previous edition,
Massachusetts Institute of Technology (13 papers) published 5 papers at the last edition, 1 more than at the previous edition,
Technion – Israel Institute of Technology (13 papers) published 3 papers at the last edition, 1 less than at the previous edition,
IBM (13 papers) published 2 papers at the last edition the same number as at the previous edition,
University of California (12 papers) published 1 paper at the last edition, 3 less than at the previous edition.
The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.
Research.com
Publication chance based on affiliation
The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.
The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.
Research.com
During the most recent 2019 edition, 2.70% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 26.39% were posted by at least one author from the top 10 institutions publishing at the conference. Another 22.22% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 38.89% of all publications and 12.50% were from other institutions.
Returning Authors Index
A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.
The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.
Research.com
Returning Institution Index
The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.
Research.com
The experience to innovation index
Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).
The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:
Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).
Research.com
The chart below illustrates experience levels of first authors in cases of publications with multiple authors.