CANS 2025: 24th International Conference on Cryptology And Network Security Osaka International Convention Center Osaka, Japan, November 17-20, 2025 |
Conference website | https://cy2sec.comm.eng.osaka-u.ac.jp/miyaji-lab/event/cans2025/index.html |
Submission link | https://easychair.org/conferences/?conf=cans2025 |
Submission deadline | April 17, 2025 |
CANS 2025 Call For Papers
About the conference
The International Conference on Cryptology and Network Security (CANS) is a premier forum for presenting research in the field of cryptology and network security. The conference seeks academic, industry, and government submissions on all theoretical and practical aspects of cryptology and network security, and its extended domains in modern computing systems (see below for Topic Areas). This year marks the 24th iteration of the conference and will be held at Osaka, Japan. Proceedings of this year's conference will be published by Springer LNCS; proceedings of previous iterations of the conference can be found online.
Submission guidelines
High quality papers on unpublished research and implementation experiences may be submitted. All papers must be original and not substantially duplicate work that has been published at, or is simultaneously submitted to, a journal or another conference or workshop with proceedings. All submissions must be written in English and span no more than 20 pages in the Springer’s Lecture Notes in Computer Science (LNCS) format, including title, abstract, and bibliography. The introduction should summarize the contributions of the paper at a level understandable by a non-expert reader and explain the context to related work.
Submitted papers may contain supplementary material in the form of well-marked appendices or a separate file archive (particularly for source code, data files, etc.). Note that supplementary material will not be included in the proceedings. Moreover, the main paper should be intelligible without requiring the reader to consult the supplementary material; the reviewers may optionally refer to the supplementary material, but are also permitted to base their assessment on the main paper alone.
Submissions must be anonymous (no author names, affiliations, acknowledgments, or obvious references). The conference will also consider short papers of up to eight pages in the LNCS format, excluding the bibliography (max 2 pages), for results that are not yet fully fleshed out or that simply require fewer pages to describe but still make a significant contribution.
All submissions must be processed with LaTeX2e according to the instructions given by Springer. Submitted manuscripts must be typeset in plain Springer LNCS format, in particular without changing the font size, margins or line spacing. Submissions not meeting these guidelines may be rejected without consideration of their merits.
Papers must be submitted via EasyChair. The deadline for submissions is 17 April anywhere on earth (AoE).
Important dates
Submission: 17 April AoE. Papers must be submitted via EasyChair.
Notification: 10 July
Camera-ready: 14 August
Conference: 17–20 November
Presentation requirements
At least one author of every accepted paper must register and pay the full registration fee (non-student) for the conference by the early registration deadline indicated by the organizers. Papers without a registered author will be removed from the sessions. Authors must present their own paper(s). Session proceedings, including all accepted papers, will be published in LNCS and will be available at the conference.
Topic areas
- Access Control
- Anonymity and Censorship Resistance
- Applied Cryptography
- Biometrics
- Block Ciphers & Stream Ciphers
- Blockchain/Cryptocurrency Security and Privacy
- Confidential Computing
- Cryptographic Algorithms and Primitives
- Cryptographic Protocols
- Cyber Attack (DDoS, Botnets, APTs) prevention, detection and response
- Cyber-crime defense and forensics
- Data and Application Security
- Denial of Service Protection
- Data and Computation Integrity
- Edge/Fog Computing Security and Privacy
- Embedded System Security
- Formal Methods for Security and Privacy
- Hash Functions
- Identity Management and Privacy
- IoT (e.g., smart homes, IoT, body-area networks, VANETs) Security
- Key Management
- Location Based Services Security and Privacy
- Malware Analysis, Detection and Prevention
- Machine Learning for Security
- Network protocol (routing, management) security
- Online Social Networks Security and Privacy
- Peer-to-Peer Security and Privacy
- Post-Quantum Cryptography and Cryptanalysis
- Privacy and anonymity in networks and distributed systems
- Privacy-Enhancing Technologies
- Public-Key Cryptography and Cryptanalysis
- Security for Cloud/Edge computing
- Security for cyber-physical systems (e.g., autonomous vehicles, industrial control systems)
- Security and Privacy of ML and AI-Based Systems
- Security and Resilient Solutions for Critical Infrastructures (e.g., electronic voting, smart grid)
- Security Architectures
- Security in Content Delivery
- Security Models
- Secure Multi-Party Computation
- Secure Distributed Computing
- Side-Channel Attacks and Countermeasures
- Trust Management
- Usable Security
- Virtual Private Networks
- Web Security (incl. social networking, crowd-sourcing, fake news/disinformation)
- Wireless and Mobile Security
- Zero-Knowledge Proofs
Program Committee
- Akiko Inoue, NEC
- Angelos Stavrou, Virginia Tech
- Armando Faz-Hernández, Cloudflare
- Avik Chakraborti, Institute for Advancing Intelligence
- Barbara Fila, Irisa
- Bernardo David, IT University of Copenhagen
- Bogdan Carbunar, Florida International University
- Byoungyoung Lee, Seoul National University
- Calvin Abou Haidar, NTT Social Informatics Laboratories
- Chao Sun, Southwest University
- Christoph Striecks, Austrian Institute of Technology
- Claudio Soriente, NEC Laboratories Europe
- Cristina Onete, University of Limoges
- Damien Vergnaud, Sorbonne Université
- Dave Singelee, Katholieke Universiteit Leuven
- Dieter Gollmann, Hamburg University of Technolog
- Eiichiro Fujisaki, JAIST
- Fareena Saqib, University of North Carolina at Charlotte
- Gerhard Hancke, City University of Hong Kong
- Hikaru Tsuchida, Saitama Institute of Technology
- Hiroshi Onuki, University of Tokyo
- Hyoungshick Kim, Sungkyunkwan University
- Insu Yun, KAIST
- Jacob C.N. Schuldt, AIST
- Jeongeun Park, Norwegian University of Science and Technology
- Joao P. Vilela, University of Porto
- Jooyoung Lee, KAIST
- Jorge Chavez-Saab, TII
- Jorge Guajardo, Robert Bosch LLC
- Jun Han, KAIST
- Katerina Mitrokotsa, University of St.Gallen
- Kazue Sako, Waseda University
- Kazuo Sakiyama, University of Electro-Communications
- Keita Emura, Kanazawa University
- Keita Xagawa, TII
- Ky Nguyen, Ecole normale superieure
- Lejla Batina, Radboud University
- Liqun Chen, University of Surrey
- Mehdi Tibouchi, NTT Social Informatics Laboratories (Co-Chair)
- Michael Roland, Johannes Kepler University Linz
- Miguel Ambrona, Input Output Global (IOHK)
- Miran Kim, Hanyang University
- Miyako Ohkubo, NICT
- Murtuza Jadliwala, University of Texas at San Antonio
- Naofumi Homma, Tohoku University
- Nils Ole Tippenhauer, CISPA
- Nitesh Saxena, Texas A&M University
- Noboru Kunihiro, University of Tsukuba
- Octavio Perez Kempner, NTT Social Informatics Laboratories
- Omid Mir, Austrian Institute of Technology
- Panos Papadimitratos, KTH (Royal Institute of Technology)
- Patrick Derbez, Inria Rennes
- Peeter Laud, Cybernetica AS
- Ravishankar Borgaonkar, SINTEF Digital, University of Stavanger
- Rene Mayrhofer, Johannes Kepler University
- Ryo Kikuchi, NTT Social Informatics Laboratories
- Serge Vaudenay, École Polytechnique Fédérale de Lausanne (EPFL)
- Sherman S.M. Chow, The Chinese University of Hong Kong
- Sofia Celi, Brave
- Sokratis Katsikas, Norwegian University of Science and Technology
- Somitra Sanadhya, IIT Jodhpur
- Sooel Son, KAIST
- Stjepan Picek, Radboud University
- Takaaki Mizuki, Tohoku University
- Willy Susilo, University of Wollongong
- Xiaoyu Ji, Zhejiang University
- Xiapu Luo, The Hong Kong Polytechnic University
- Yang Yu, Tsinghua University
- Yanjun Pan, University of Arkansas
- Yiannis Tselekounis, Royal Holloway
- Yingying Chen, Rutgers
- Yongdae Kim, KAIST (Co-Chair)
- Yongsoo Song, Seoul National University