Be Ready for Next Schedule

ICSP 2026 5th International Conference on Security & Privacy
🌍 NIT Warangal    📆 November 26-28, 2026

📢 Important: Paper Submission Deadline – July 15, 2026    |    Schedule    |    Registration

Call for Papers

Original papers offering novel research contributions on all aspects of Security and Privacy are solicited
for submission to ICSP 2026. Areas of interest include, but are not limited to:

Public Key Cryptography
  • Key Exchange Mechanisms
  • Entity Authentication Protocols
  • Digital Signatures
  • Elliptic Curve Cryptography
  • Lattice-Based Cryptography
  • Codes-Based Cryptography
  • Isogeny-Based Cryptography
  • Multivariate-Based Cryptography
  • Pairing-Based Cryptography
  • Fully Homomorphic Encryption
  • Multi-Party Computation
  • Attribute-Based Encryption and Authentication
  • Functional Encryption
  • Zero-Knowledge Proofs
  • Quantum Cryptography
  • Provable Security and Cryptanalysis
Symmetric Key Cryptography
  • Authenticated Encryption (AE and AEAD)
  • Hash Functions and Cryptographic Hashing
  • Message Authentication Codes (MAC)
  • Pseudorandom Functions (PRF)
  • Pseudorandom Permutations (PRP)
  • Key Derivation Functions (KDF)
  • Block Ciphers and Stream Ciphers
  • Cryptographic Permutations and Sponge Constructions
  • Extendable Output Functions (XOF)
  • Deck Functions and Tweakable Constructions
  • Security Proofs of Modes and Constructions
  • Provable Security of Encryption Modes
  • Differential and Linear Cryptanalysis
  • Side-Channel and Fault Attacks on Symmetric Primitives
  • Quantum Security of Symmetric Schemes
Cryptographic Engineering
  • Cryptographic Engineering
  • Design of Cryptographic Primitives
  • Random Number Generators and PUF
  • Cryptographic Hardware
  • Cryptographic Software
  • Cryptographic Protocols
  • Formal Methods in Cryptographic Engineering
  • Evaluation of Cryptographic Systems
  • Attacks and Countermeasures
  • Physical Attacks and Countermeasures
  • Fault Analysis and Countermeasures
  • Reverse Engineering and Tampering
  • Hardware Trojans and Counterfeit Detection
Cryptography Applications
  • Electronic Voting
  • Cryptocurrency
  • Blockchain
  • Privacy and Anonymity
  • IoT Security and Privacy
  • Cloud Security
  • Biometric Security
  • Security and Privacy of Big Data
  • Cloud and Edge Computing Security
  • Steganography and Steganalysis
  • Cyber-Physical Security
  • Database Security
  • Embedded Systems Security
  • Lightweight Security
  • Network Security
  • Computer Security
  • Secure Distributed Computing
  • Edge/Fog Computing Security and Privacy
  • Privacy-Enhancing Technologies
  • Security and Privacy of ML & AI Systems
  • Audit and Risk Analysis
  • Critical Infrastructure Security
  • Human Aspects of Security and Privacy
  • Information Security Management
  • Mobile and Vehicular Network Security
  • Pervasive Systems Security
  • Surveillance and Censorship
  • Trust Management


Instructions:

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference/workshop that has proceedings. All submissions should start with a title, an abstract and keywords, but must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements). Length of the submission should not exceed 16 pages including the bibliography and well-marked appendices, and supplementary material, and using at least 10 point fonts and reasonable margins. Submissions must be prepared in CCIS templates and submitted electronically in PDF format. It is strongly recommended that submissions are processed in LaTeX. Authors are advised to check the plagiarism of their manuscripts before submission. It should not exceed 20%. Submissions not meeting these guidelines risk rejection without consideration of their merits. Submission of manuscripts does not guarantee acceptance. It will be decided by the Editors, Reviewers and the Organizing Committee.

Please note that at least one author of each accepted paper should register to the conference and give a presentation at the conference. Failure to register or absence from the presentation will eventually make your paper NOT being included in the conference proceedings.

CCIS Template: click here.



WHERE TO SUBMIT?

Please submit full length paper on Microsoft CMT using the following link: click here .

HOW TO SUBMIT?

Please follow the following link: click here *.
*Note that submissions must be anonymous (i.e. without author name(s), affiliation(s) and acknowledgements).