CT-RSA 2014
RSA Conference Cryptographers' Track
San Francisco        February 24-28, 2014

Held in conjunction with
RSA Conference USA

Call for Papers

Original research papers pertaining to all aspects cryptography are
solicited. Topics include but are not limited to:

    Public-key encryption
    Symmetric-key encryption
    Digital signatures
    Hash functions
    Cryptographic protocols
    Efficient implementations 

	

    Elliptic-curve cryptography
    Lattice-based cryptography
    Quantum cryptography
    Network security
    E-commerce 

	

    Cryptanalysis
    Hardware security
    Tamper-resistance
    Side-channel attacks and defenses
    Malware detection and prevention
    Spam and fraud deterrence 

Critical Dates
Submission Deadline:    September 5, 2013 -- 23:59 PDT (UTC-7)
Notification:    October 31, 2013
Submission Instructions

All submissions should be uploaded to
https://cmt.research.microsoft.com/CTRSA2014/ in pdf, doc, or docx
format by the September 5 deadline.

Submissions must not substantially duplicate work that any of the
authors has published in a journal or in a conference or workshop with
proceedings, or has submitted or is planning to submit before the
author notification deadline to a journal or other conferences or
workshops that have proceedings. Accepted submissions may not appear
in any other conference or workshop that has proceedings.

Submissions must be anonymous, with no author names, affiliations,
acknowledgments, or obvious references. Each should begin with a
title, a short abstract, and a list of keywords. Each submission
should be at most 12 pages excluding bibliography and appendices using
single column with at least 11pt size font, reasonably sized margins,
and in total not more than 18 pages. (A total of 16 pages will be
applied to those papers accepted for publication in the proceedings.)
Committee members are not required to read appendices, and submissions
should be intelligible without them. Submissions not meeting these
guidelines risk rejection without consideration of their merits.

Authors should report any "conflicts" with program committee members
listed below. A conflict exists if an author and committee member have
the same affiliation or have been co-authors on a paper within the
past two years.

Program Committee

Josh Benaloh (chair) 	Microsoft Research
Tom Berson 		Anagram Laboratories
Alex Biryukov 		Université du Luxembourg
John Black 		University of Colorado
Xavier Boyen 		Queensland University of Technology
Christian Cachin 	IBM Research
Orr Dunkelman 		University of Haifa
Steven D. Galbraith 	University of Auckland
Jens Groth 		University College London
Helena Handschuh 	Cryptography Research, Inc.
Markus Jakobsson 	PayPal
Marc Joye 		Technicolor
John Kelsey 		National Institute of Standards and Technology
Kwangjo Kim 		Korea Advanced Institute of Science and Technology
Lars Knudsen 		Technical University of Denmark
Alptekin Küpçü 	Koç University
Susan Langford 				Hewlett-Packard
Anna Lysyanskaya 	Brown University
Mitsuru Matsui 		Mitsubishi Electric
Sarah Meiklejohn 	University of California, San Diego
Daniele Micciancio 	University of California, San Diego
Tal Moran 		Interdisciplinary Center Herzliya
Bart Preneel 		KU Leuven
Christian Rechberger 	Technical University of Denmark
Matt Robshaw 		Impinj
Rei Safavi-Naini 	University of Calgary
Nigel Smart 		University of Bristol
Vanessa Teague 		University of Melbourne
Eran Tromer 		Tel Aviv University
Serge Vaudenay 		École Polytechnique Fédérale de Lausanne
Hoeteck Wee 		George Washington University
Yiqun Lisa Yin 		Independent Security Consultant