学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 陈晓峰的留言板

密码学会议(纯属个人观点。如有巧合,不胜荣幸;如不认同,欢迎来电来函洽谈。)

1.密码学中最著名的会议当属国际密码学协会(IACR)所资助的三大会:CryptoEurocryptAsiacrypt。即所谓的美密会,欧密会,亚密会。密码学中最重要的最好的文章一般都在这三个会议中。
 

2.国际密码学协会除了资助三大会以外,还资助了几个Workshop (有的也已经变成Conference):Public Key Cryptography (PKC), Fast Software Encryption (FSE), Cryptographic Hardware and em[ant]bedded Systems(CHES), Theory of Cryptography Conference(TCC)等。 PKC主要接受与公钥体制相关的文章,FSE 和CHES主要接受对称体制相关的文章,分别偏重软件和硬件。TCC 是2005年开始的一个会议,主要接受密码学理论和基础的文章,非常难中。此外还有一些较好的会议如CT-RSA,Financial Cryptography and Data Security (FC)等。 其中CT-RSA是RSA会议中密码学理论(Cryptography Theory)的子会议, 由RSA公司资助。FC 由国际金融密码协会 (IFCA)资助,主要接受与金融密码学相关的文章。

PKC: focusing on all aspects of public-key cryptography.
Fast Software Encryption: concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and message authentication codes.
Cryptographic Hardware and embedded Systems: on all aspects of cryptographic hardware and security in embedded systems. 

Theory of Cryptography Conference: deals with the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems.

 

3.首先包括一些历史悠久的密码会议如澳大利亚密码会 (ACISP), 印度密码会 (Indocrypt), 韩国密码会 (ICISC), ICICS, Information Security Conference (ISC), Selected Areas in Cryptography (SAC), Security and Cryptography for Networks (formly Security in Communication Networks: SCN), ACNS。 最近的有马来西亚密码会 (Mcrypt),越南密码会 (Vietcrypt), CANS, IPSEC, Inscrypt (formly CISC) , ProvSec等。还有很多的会议不能一一列出。 值得一提的是 Inscrypt 是信息安全国家重点实验室发起的在中国举办的LNCS出版的密码年会。还有两个信息安全会议也是非常难中(五星级):
1. IEEE Symposium on Security and Privacy:computer security and electronic privacy.
2. ACM Computer and Communications Security Conference:academia and industry presenting novel research on all theoretical and practical aspects of computer security
 

 

Links on Cryptography and Information Security:

 

Research Institute:

 

Journals on Cryptography and Information Security:

 

Others: