Ranking & Metrics
Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.
Research Impact Score:0.50
Contributing Best Scientists:2
H5-index:
Papers published by Best Scientists3
Research Ranking (Computer Science)63
Research Ranking (Mathematics)35
Research Ranking (Mathematics)15
Research Ranking (Computer Science)73
Conference Call for Papers
Original contributions on all technical aspects of cryptology are solicited for submission to Crypto 2023, the Crypto 2023. Submissions are welcomed on any cryptographic topic including but not limited to:
foundational theory and mathematics
the design, proposal, and analysis of cryptographic primitives and protocols
secure implementation and optimization in hardware or software
applied aspects of cryptography
Overview
Top Research Topics at International Cryptology Conference?
Theoretical computer science (33.74%)
Discrete mathematics (25.36%)
Cryptography (24.46%)
International Cryptology Conference mainly deals with areas of study such as Theoretical computer science, Discrete mathematics, Cryptography, Computer security and Encryption.
The study of Secure multi-party computation and how it intertwines with concepts under Secret sharing were explored in the presented Theoretical computer science research.
Some problems in Discrete mathematics that were presented in the event overlapped with concepts under Combinatorics, Discrete logarithm, Block cipher, Zero-knowledge proof and Function (mathematics).
The Zero-knowledge proof study featured falls within the larger field of Mathematical proof.
In addition to Cryptography research, International Cryptology Conference aims to explore topics under Digital signature and Public-key cryptography.
The event holds forums on Computer security that merges themes from other disciplines such as Scheme (programming language) and Protocol (object-oriented programming).
Probabilistic encryption, Ciphertext, Attribute-based encryption and Homomorphic encryption are some of the study areas of Encryption discussed.
It focuses on Probabilistic encryption but the discussions also offer insight into other areas such as Multiple encryption and 40-bit encryption.
Cryptographic hash function, SHA-2 and Collision resistance are all aspects of Hash function research featured in the event.
What are the most cited papers published at the conference?
A public key cryptosystem and a signature scheme based on discrete logarithms (6600 citations)
Differential Power Analysis (5822 citations)
Identity-based cryptosystems and signature schemes (5634 citations)
Research areas of the most cited articles at International Cryptology Conference:
The concepts of Theoretical computer science, Cryptography, Computer security, Encryption and Discrete mathematics are tackled in the conference publications.
While the primary focus in the published papers is Theoretical computer science, they also dissect topics surrounding Random oracle and Standard model (cryptography) as a whole.
While the most cited papers focused on Cryptography, they were also able to explore topics like Mathematical proof and Digital signature.
What topics the last edition of the conference is best known for?
Operating system
Cryptography
Algorithm
The previous edition focused in particular on these issues:
The conference is mainly concerned with subjects like Theoretical computer science, Discrete mathematics, Cryptography, Protocol (object-oriented programming) and Secure multi-party computation.
Topics in Theoretical computer science were tackled in line with various other fields like Mathematical proof, Random oracle, Cryptographic primitive, Construct (python library) and Learning with errors.
International Cryptology Conference mainly concentrates on Discrete mathematics but also investigates its connection with concepts in disciplines such as
Group (mathematics) that connect with fields like Signature (logic),
Degree (graph theory), which have a strong connection to Polynomial..
Scheme (programming language), Simple (abstract algebra), Encryption and Arithmetic are some topics wherein Cryptography research discussed in the event have an impact.
Protocol (object-oriented programming) research presented in the conference encompasses a variety of subjects, including Computer security, Task (computing), Computation and Abort.
The event facilitates discussions on Secure multi-party computation that incorporate concepts from other fields like Multiplication, Randomness and Oblivious transfer.
The most cited articles from the last conference are:
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions (31 citations)
On the Local Leakage Resilience of Linear Secret Sharing Schemes (19 citations)
A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.
The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.
Research.com
Top authors and change over time
The top authors publishing at International Cryptology Conference (based on the number of publications) are:
Ivan Damgård (60 papers) published 1 paper at the last edition the same number as at the previous edition,
Amit Sahai (54 papers) published 1 paper at the last edition the same number as at the previous edition,
Rafail Ostrovsky (53 papers) published 1 paper at the last edition the same number as at the previous edition,
Mihir Bellare (49 papers) absent at the last edition,
Yuval Ishai (47 papers) published 6 papers at the last edition, 4 more than at the previous edition.
The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.
Research.com
Top affiliations and change over time
Only papers with recognized affiliations are considered
The top affiliations publishing at International Cryptology Conference (based on the number of publications) are:
IBM (147 papers) published 4 papers at the last edition the same number as at the previous edition,
Massachusetts Institute of Technology (145 papers) published 7 papers at the last edition, 1 more than at the previous edition,
Weizmann Institute of Science (106 papers) published 1 paper at the last edition, 4 less than at the previous edition,
Technion – Israel Institute of Technology (102 papers) published 8 papers at the last edition, 6 more than at the previous edition,
Aarhus University (99 papers) published 6 papers at the last edition the same number as at the previous edition.
The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.
Research.com
Publication chance based on affiliation
The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.
The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.
Research.com
During the most recent 2021 edition, 5.31% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 27.10% were posted by at least one author from the top 10 institutions publishing at the conference. Another 16.82% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 28.04% of all publications and 28.04% were from other institutions.
Returning Authors Index
A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.
The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.
Research.com
Returning Institution Index
The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.
Research.com
The experience to innovation index
Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).
The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:
Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).
The chart below illustrates experience levels of first authors in cases of publications with multiple authors.