From fc25chair at ifca.ai Mon Oct 7 09:19:38 2024 From: fc25chair at ifca.ai (FC25 Program Chairs) Date: Mon, 07 Oct 2024 01:19:38 -0600 Subject: [fc-announce] Final Call for Papers: Financial Cryptography 2025 (extended submission deadline: 11 October 2024) Message-ID: <91e5a2bfcc95666ce0f879fb63218a8d@ifca.ai> FINAL CALL FOR PAPERS ====================================================================== Financial Cryptography and Data Security 2025 Twenty-Ninth International Conference 14?18 April 2025 Hotel Shigira Mirage, Miyakojima, Japan https://fc25.ifca.ai/ ====================================================================== ABOUT THE CONFERENCE Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and interdisciplinary works are particularly encouraged. ====================================================================== IMPORTANT DATES Paper submission 11 October 2024 Paper notification 6 December 2024 Final pre-proceedings papers 14 February 2025 Conference 14-18 April 2025 All submissions are accepted until 23:59, AoE UTC-12. ====================================================================== CONTACT fc25chair at ifca.ai ====================================================================== TOPICS Access control, authorization and trust management Anonymity and privacy enhancing technologies Applied cryptography Attacks, attack techniques, and attack case studies Auctions and incentive design Authentication, identity management and biometrics Behavioral aspects of security and privacy Blockchain applications Blockchain protocols, proof-of-work, -stake, -burn Censorship circumvention and resistance Central bank digital currency (CBDC) Certification and audits Cloud computing and data outsourcing security Cryptographic protocols Data security and privacy Decentralized finance (DeFi) Digital cash and payment systems Digital rights management Distributed consensus protocols Economic and monetary aspects of cryptocurrencies Economics of security and privacy Electronic crime and underground markets Electronic payments and ticketing systems Empirical studies, real-world measurements and metrics Forensics, monitoring and transaction graph analysis Fraud detection and management Game theory for security, privacy, and blockchain Language-based security and formal verification Legal and regulatory issues of blockchains, cryptocurrencies, and electronic payments Machine learning and AI security Malware and software security Mobile payments Network and distributed system security Phishing and social engineering Scalability and interoperability of cryptocurrencies Security of banking, financial services, and electronic commerce Security of peer-to-peer networks Smart contracts and financial instruments Smartcards, secure tokens, and secure hardware Surveillance and tracking System security Trusted execution environments (TEE), their security and applications Usability and security Web security Zero-knowledge proofs REMEMBER! THE "CRYPTO" IN FINANCIAL CRYPTOGRAPHY COVERS MORE THAN JUST YOUR DIGITAL CASH--IT'S ALSO THE SECRET SAUCE BEHIND KEEPING YOUR SPY-LEVEL MESSAGES SAFE! ====================================================================== SUBMISSION Contributions are sought in the following categories: - Research papers: regular papers (15 pages + references and appendices), short papers (8 pages + references; no appendices), and systematization of knowledge (SoK) papers (20 pages + references and appendices) - Workshop proposals (2 pages) - Tutorial proposals (2 pages) Research paper submissions must be uploaded through the conference submission website: https://crypto.unibe.ch/fc25/ The submission deadline for workshop and tutorial proposals has passed but late submissions might be considered on a rolling basis, as space allows. See the conference website at https://fc25.ifca.ai/cfp.html for details. ====================================================================== GENERAL INFORMATION For each accepted paper the conference requires at least one registration at the general or academic rate, and paper authors must sign the IFCA copyright form when submitting the final version. Alternatively, individual papers can be published as fully open access--the publisher charges authors a fee for this. https://ifca.ai/documents/copyright.html ====================================================================== FORMAT Papers must be formatted in standard LNCS format (templates) and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found here and at the submission site. ====================================================================== ANONYMOUS SUBMISSION Regular and short research paper submissions as well as SoKs must be anonymized with no author names, affiliations, acknowledgments, or obvious references. Failure to properly anonymize submitted papers is grounds for a desk rejection without review. It is acceptable (but by no means required) for submitted papers to be published online in non-anonymous form (e.g., on authors' websites or archives like the Cryptology ePrint Archive or arXiv.org). Program committee members will be instructed not to actively seek to de-anonymize papers. ====================================================================== ORIGINAL SUBMISSIONS Authors may submit only work that does not substantially overlap with work that is currently submitted or has been accepted for publication to any other peer-reviewed conference/workshop with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. Note that it is acceptable for papers to appear in non-peer-reviewed formats (for example, as technical reports or in online archives such as ePrint). In case of doubt contact the program chairs for any clarifications. ====================================================================== ETHICS AND ETIQUETTE Authors are required to read and follow this information on ethics and etiquette: https://fc25.ifca.ai/ethics.html ====================================================================== CONFLICT OF INTEREST Authors must report in the submission site any conflicts with program committee members. A conflict exists if an author has the same affiliation as a committee member, has ever acted as their PhD supervisor or been supervised by them, has a close personal relationship with them, or if they have been co-authors on a paper within the past two years. PC chairs are not allowed to submit papers where they appear as (co-)authors. PC members will not be able to review, read the reviews of, or participate in discussions of papers they are conflicted with. The review process for papers conflicted with both PC chairs will be managed by another PC member designated as the "conflict chair". ====================================================================== EVALUATION CRITERIA Regular Research Papers Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages in standard LNCS format excluding references and appendices. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them. Short Papers Short papers are also subject to peer review; however, the intention is to encourage authors to introduce work in progress, novel applications, and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format, excluding references. The title for short papers must begin with the text "Short Paper:". Accepted submissions will be included in the conference proceedings. The authors of some submissions not accepted as regular research papers may be offered the option of acceptance as a short paper. Systematization of Knowledge Papers We also solicit Systematization of Knowledge (SoK) papers. To be suitable for publication, SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions. SoK paper submissions are limited to 20 pages in standard LNCS format excluding references and appendices. Accepted submissions will be included in the conference proceedings. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them. The paper title for systematization of knowledge papers must begin with the text "SoK:". ====================================================================== RUMP SESSION The conference will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5 minutes), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced at the conference). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail or submitted in person in the morning on the day of the session. ====================================================================== PROGRAM CHAIRS Christina Garman, Purdue University Pedro Moreno-Sanchez, IMDEA Software Institute & VISA Research ====================================================================== PROGRAM COMMITTEE Hamza Abusalah, IMDEA Software Institute Ghada Almashaqbeh, University of Connecticut Orestis Alpos, Common Prefix Jayamine Alupotha, University of Bern Ignacio Amores Sesar, University of Bern Lukas Aumayr, Common Prefix Zeta Avarikioti, TU Wien & Common Prefix Massimo Bartoletti, University of Cagliari Soumya Basu, Nuveaux Trading Don Beaver, Fierce Logic Adithya Bhat, Visa Research Alexander R. Block, University of Illinois Chicago Rainer B?hme, University of Innsbruck Joseph Bonneau, NYU & a16z crypto Stefanos Chaliasos, Imperial College London Panagiotis Chatzigiannis, Visa Research James Hsin-yu Chiang, Aarhus University Hao Chung, Carnegie Mellon University Michele Ciampi, The University of Edinburgh Jeremy Clark, Concordia University Bernardo David, IT University of Copenhagen & Common Prefix Rafael Dowsley, Monash University Sisi Duan, Tsinghua University Yue Duan, Singapore Management University Muhammed F. Esgin, Monash University Aleksander Essex, Western University Ittay Eyal, Technion Hanwen Feng, University of Sydney Matheus Xavier Ferreira, University of Virginia Arthur Gervais, University College London Noemi Glaeser, University of Maryland & MPI-SP Tiantian Gong, Purdue University Yue Guo, JP Morgan AI Research Suyash Gupta, University of Oregon Lucjan Hanzlik, CISPA Helmholtz Center for Information Security Hannes Hartenstein, Karlsruhe Institute of Technology Bernhard Haslhofer, Complexity Science Hub Ningyu He, The Hong Kong Polytechnic University Lioba Heimbach, ETH Zurich Jaap-Henk Hoepman, Radboud University / Karlstad University Yan Ji, Chainlink Labs Xiangkun Jia, Institute of Software Chinese Academy of Sciences Yanxue Jia, Purdue University Chenglu Jin, CWI Amsterdam Tushar Jois, City College of New York Ari Juels, Cornell Tech Ghassan Karame, Ruhr-University Bochum Harish Karthikeyan, JP Morgan AI Research Mahimna Kelkar, Cornell University Lucianna Kiffer, IMDEA Networks Jason Kim, Georgia Institute of Technology Lefteris Kokoris Kogias, Mysten Labs Yashvanth Kondi, Silence Laboratories (Deel) Kari Kostiainen, ETH Zurich Mario Larangeira, Tokyo Institute of Technology / IOG Duc V. Le, Visa Research Eysa Lee, Brown University Stefanos Leonardos, King's College London Jacob Leshno, University of Chicago Jiasun Li, George Mason University Orfeas Stefanos Thyfronitis Litos, Imperial College London & Common Prefix Jing Liu, MPI-SP & UC Irvine Xiangyu Liu, Purdue University and Georgia Institute of Technology Zeyan Liu, University of Louisville Chen-Da Liu-Zhang, Lucerne University of Applied Sciences and Arts & Web3 Foundation Donghang Lu, TikTok Yuan Lu, Institute of Software Chinese Academy of Sciences Varun Madathil, Yale University Akaki Mamageishvili, Offchain Labs Easwar Vivek Mangipudi, Supra Research Elisaweta Masserova, CMU Shin'ichiro Matsuo, Virginia Tech/Georgetown University Roman Matzutt, Fraunhofer FIT Patrick McCorry, Arbitrum Foundation Kelsey Melissaris, Aarhus University Johnnatan Messias, Jason Milionis, Columbia University Pratyush Mishra, University of Pennsylvania Ciamac Moallemi, Columbia University Malte M?ser, Chainalysis Neha Narula, MIT Kenneth Emeka Odoh, Georgios Palaiokrassas, Yale University Georgios Panagiotakos, IOG Dimitrios Papadopoulos, HKUST Krzysztof Pietrzak, Institute of Science and Technology Austria (ISTA) Kaihua Qin, Yale University Alfredo Rial, Nym Technologies Pierre-Louis Roman, Tim Roughgarden, Columbia University & a16z crypto Reihaneh Safavi-Naini, University of Calgary Giulia Scaffino, TU Wien & Common Prefix Nibesh Shrestha, Supra Research Pratik Soni, University of Utah Alberto Sonnino, Mysten Labs & University College London Alexander Spiegelman, Aptos Labs Srivatsan Sridhar, Stanford University Chrysoula Stathakopoulou, Chainlink Labs Erkan Tairi, ENS Paris Wenpin Tang, Columbia University Sri AravindaKrishnan Thyagarajan, University of Sydney Christof Ferreira Torres, INESC-ID / Instituto Superior T?cnico (IST) Daniel Tschudi, Concordium Taro Tsuchiya, Carnegie Mellon University Marie Vasek, UCL Friedhelm Victor, TRM Labs Yann Vonlanthen, ETH Zurich Anh V. Vu, University of Cambridge Jun Wan, Five Rings LLC Ding Wang, Nankai University Haoyu Wang, Huazhong University of Science and Technology Kanye Ye Wang, University of Macau Qin Wang, CSIRO Data61 Shouqiao Wang, Columbia University Xuechao Wang, HKUST(GZ) Zhipeng Wang, Imperial College London Ke Wu, University of Michigan Zhuolun Xiang, Aptos Labs Guowen Xu, University of Electronic Science and Technology of China Jiahua Xu, University College London Yingjie Xue, The Hong Kong University of Science and Technology (Guangzhou) Aviv Yaish, Yale University Zheng Yang, Southwest University Mengqian Zhang, Yale University Hong-Sheng Zhou, Virginia Commonwealth University Liyi Zhou, University of Sydney Yajin Zhou, Zhejiang University & BlockSec