Call for Papers

The Information Security Conference (ISC) is an annual international conference covering research in theory and applications of Information Security. ISC aims to attract high quality papers in all technical aspects of information security.

This includes submissions from academia, industry and government on traditional as well as emerging topics and new paradigms in these areas, with a clear connection to real-world problems, systems, or applications.

Types of Submissions Solicited

Papers on all technical aspects of information security, cryptography, and privacy are solicited for submission. Areas of interest include, but are not limited to:

access controlformal methodspost-quantum cryptography
anonymityfoundationsprivacy
applied cryptographyfunctional encryptionprivacy-enhancing technologies
attribute-based cryptographyhardness assumptionsprotocols
automated security analysishomomorphic encryptionpublic-key cryptography
biometric securityidentity-based cryptographyreal-world cryptography
blockchainidentity managementsecure messaging
certificationimplementationssecure voting
cloud computingindistinguishability obfuscationsecurity proofs
containerizationInternet securityside-channel attacks
critical infrastructuresintrusion detectionsoftware security
cryptanalysiskey managementstandardization
cryptocurrencymalwaresymmetric-key cryptography
cybercrimemathematical aspectsthreshold cryptography
database/system securitymicro-architectural attackstrusted execution
decentralized systemsmobile/wireless/5G securityunlinkability
downgrade attacksmultilinear mapsusability
embedded platformsmulti-party computationvulnerabilities
fault attacksnetworks securityweb security
fingerprintingOS and systems securityzero-knowledge proofs

Deadlines

Submission Deadline: June 4, AoE June 11, AoE (Extended)
Rebuttal: July 13-16, AoE
Notification: July 29, AoE
Camera-Ready Deadline: August 13, AoE
Conference: October 20-22, KST

Best Paper Award

Accepted papers will be judged and ranked by the Program Committee. The best papers will be considered for the Best Paper Award (thanks to the gracious support from Springer).

Instructions for Authors

Submissions must be original work and may not be under submission to another journal or conference with proceedings at the time of review. Submissions must be in the Springer Lecture Notes in Computer Science (LNCS) style, with the default margins and fonts, but with the addition of page numbers (e.g., by adding \pagestyle{plain}). They are limited to 16 pages excluding bibliography and appendices, and to 20 pages including bibliography and appendices. Optionally, any amount of clearly marked supplementary material may be supplied, following the main body of the paper, but reviewers are not required to read this supplementary material and submissions are expected to be intelligible and complete without it.

Authors should consult Springer’s authors’ guidelines and use their LaTeX proceedings template. Springer encourages authors to include their ORCIDs in their papers. Submitted papers must be in PDF format and submitted electronically via the ISC 2025 submission system (HotCRP). The submission must be anonymous with no author names, affiliations, or obvious references.

For papers that are accepted, the corresponding author must, acting on behalf of all of the authors of that paper, complete and sign a Consent-to-Publish form, through which the copyright for their paper is transferred to Springer. The corresponding author signing the copyright form should match the corresponding author marked on the paper. Once the files have been sent to Springer, changes relating to the authorship of the papers cannot be made. Moreover, authors of accepted papers must guarantee that their paper will be presented at the conference.