Inscrypt 2015

The 11th International Conference on Information Security and Cryptology

November 1-3, 2015, Beijing, China

The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015) will be held in Beijing, from November 1 to 3, 2015, co-organized by the State Key Laboratory of Information Security, the Chinese Association for Cryptologic Research of China, and In Cooperation with IACR. It is an annual conference targeting the top research results in the related area. Topics of interest encompass research advances in ALL areas of information security, cryptology, and their applications. Inscrypt 2015 seeks high-quality research contributions in the form of well-developed papers, and two successive tracks for crypto and security respectively will be organized. The conference proceedings will be published by Springer-Verlag in LNCS series.


There will be two tracks focusing on different aspects of information security and cryptology.
Authors are invited to submit full papers presenting new research results related to cryptology, information security and their applications for either crypto track or security track. All submissions must describe original research that is not published or currently under review by another conference or journal. Areas of interest include, but are not limited to the following:

Crypto Track:
Foundations of Cryptography
Provable Security
Sequences and Boolean Functions
Secure Multiparty Computation
Symmetric Key Cryptosystems
Public Key Cryptosystems
Implementation of Cryptosystems
Hash Functions and MACs
Block Cipher Modes of Operation
Key Management and Key Recovery
Security Protocols and Their Analysis
Information Hiding and Watermarking
secure computation outsourcing
functional computation and verifiable computation
leakage resilient cryptography

Security Track:
Access Control
Authentication and Authorization
Biometric Security
Distributed System Security
Electronic Commerce Security
Intrusion Detection
Network Security
Security Modeling and Architectures
Intellectual Property Protection
Mobile System Security
Operating System Security
Risk Evaluation and Security Certification
Prevention and Detection of Malicious Codes
Privacy enhancing technologies
genomic privacy and SDN security
big data and cloud security

Instruction for Authors

Conference language is English. All submissions must be anonymous, with no author names, affiliations, acknowledgments, or obvious references. It should begin with a title, a short abstract, and a list of key words, and its introduction should summarize the contributions of the paper at a level appropriate for a non-specialist reader. The paper should be intelligible and self-contained within 20 pages including references and appendices and must be submitted electronically to . Submissions not meeting these guidelines risk rejection without consideration of their merits. It is highly advised to prepare the submissions in the Springer LNCS format. More information can be found at conference web site

Important Dates

Deadline for Submission: August 10, 2015
Notification of Acceptance: October 8, 2015 
Pre-proceedings version deadline: October 15, 2015 
Proceedings version deadline: December 3, 2015 

Conference Chair:

Dan Meng, Institute of Information Engineering, CAS, China
Jianying Zhou, Institute for Infocomm Research, Singapore

Program Co-Chairs:

Dongdai Lin, Institute of Information Engineering, CAS, China
Xiaofeng Wang, Indiana University at Bloomington, USA
Moti Yung, Google Inc. & Columbia University, USA

Local Orgranizing committee Co-Chairs:

Chuankun Wu, Institute of Information Engineering, CAS, China
Yanping Yu, Chinese Association for Cryptologic Research, China

Conference email: