
۲۵ فروردین - ۲۹ فروردین ۱۴۰۴
Financial Cryptography and Data Security Conference

نمای کلی
The Financial Cryptography and Data Security 2025 conference (FC 2025), organized by the International Financial Cryptography Association (IFCA), will be held in Miyakojima, Japan, from April 14-18, 2025. The conference focuses on information assurance, especially in commercial contexts, covering topics from applied cryptography to blockchain applications. FC 2025 seeks original research and encourages interdisciplinary works.
Call for Papers
Financial Cryptography and Data Security 2025
Twenty-Ninth International Conference
14–18 April 2025
Hotel Shigira Mirage, Miyakojima, Japan
Important Dates
- Paper submission: October 8, 2024
- Paper notification: December 6, 2024
- Final pre-proceedings papers: February 14, 2025
- Workshop and tutorial submission: September 13, 2024
- Workshop and tutorial notification: September 27, 2024
- Conference: April 14–18, 2025
Satoshi Grace Period
Due to a projected event on the Ethereum's Beacon Chain on October 4th, 2024, the paper submission deadline may be extended as follows:
- Number 0, 1: October 8 (original deadline)
- Number 2, 3, 4: October 9
- Number 5, 6, 7, 8, 9: October 10
- Number A, B, C, D, E, F: October 11
The random number in slot 10100000 is 0x8fbc79eb733d3fef8d218a0924bda4a0ff676317790dc58c278a462f7d9c03aed1618be49df1fd77e44f0c8ef260e0ea14c7bda670d0262cc473a6a87b67eb21dcef93e75dd29d98f1c3872432e9de58e2b20f602795baa551c082cea435d52e and the FC25 submission deadline is thus October 11, 2024.
Topics
- Access control, authorization and trust management
- Anonymity and privacy enhancing technologies
- Applied cryptography
- Attacks, attack techniques, and attack case studies
- Auctions and incentive design
- Authentication, identity management and biometrics
- Behavioral aspects of security and privacy
- Blockchain applications
- Blockchain protocols, proof-of-work, -stake, -burn
- Censorship circumvention and resistance
- Central bank digital currency (CBDC)
- Certification and audits
- Cloud computing and data outsourcing security
- Cryptographic protocols
- Data security and privacy
- Decentralized finance (DeFi)
- Digital cash and payment systems
- Digital rights management
- Distributed consensus protocols
- Economic and monetary aspects of cryptocurrencies
- Economics of security and privacy
- Electronic crime and underground markets
- Electronic payments and ticketing systems
- Empirical studies, real-world measurements and metrics
- Forensics, monitoring and transaction graph analysis
- Fraud detection and management
- Game theory for security, privacy, and blockchain
- Language-based security and formal verification
- Legal and regulatory issues of blockchains, cryptocurrencies, and electronic payments
- Machine learning and AI security
- Malware and software security
- Mobile payments
- Network and distributed system security
- Phishing and social engineering
- Scalability and interoperability of cryptocurrencies
- Security of banking, financial services, and electronic commerce
- Security of peer-to-peer networks
- Smart contracts and financial instruments
- Smartcards, secure tokens, and secure hardware
- Surveillance and tracking
- System security
- Trusted execution environments (TEE), their security and applications
- Usability and security
- Web security
- Zero-knowledge proofs
Submission
Contributions are sought in the following categories:
- Research papers: regular papers (15 pages + references and appendices),
short papers (8 pages + references; no appendices), and
systematization of knowledge (SoK) papers (20 pages + references and appendices) - Workshop proposals (2 pages)
- Tutorial proposals (2 pages)
Research Papers
- Regular papers, short papers, and SoKs must be submitted through the conference submission website.
- Regular research papers (15 pages + references and appendices)
- Short papers (8 pages + references; no appendices)
- Systematization of knowledge (SoK) papers (20 pages + references and appendices)
Workshop and Tutorial Proposals
Workshop and tutorial proposals should be sent by email to fc25workshops@ifca.ai.
General Information
- For each accepted paper, the conference requires at least one registration at the general or academic rate.
- Paper authors must sign the IFCA copyright form when submitting the final version.
- Individual papers can be published as fully open access—the publisher charges authors a fee for this.
Format
- Papers must be formatted in standard LNCS format (templates) and submitted as PDF files. Submissions in other formats will be rejected.
- All papers must be submitted electronically according to the instructions and forms found here and at the submission site.
Anonymous Submission
- Regular and short research paper submissions as well as SoKs must be anonymized with no author names, affiliations, acknowledgments, or obvious references.
- Failure to properly anonymize submitted papers is grounds for a desk rejection without review.
- Program committee members will be instructed not to actively seek to de-anonymize papers.
Original Submissions
- Authors may submit only work that does not substantially overlap with work that is currently submitted or has been accepted for publication to any other peer-reviewed conference/workshop with proceedings or a journal.
- Double submission is considered serious research fraud.
- It is acceptable for papers to appear in non-peer-reviewed formats (e.g., as technical reports or in online archives such as ePrint).
Ethics and Etiquette
Authors are required to read and follow this information on ethics and etiquette.
Conflict of Interest
- Authors must report in the submission site any conflicts with program committee members.
- PC members will not be able to review, read the reviews of, or participate in discussions of papers they are conflicted with.
- The review process for papers conflicted with both PC chairs will be managed by another PC member designated as the "conflict chair".
Evaluation Criteria
Regular Research Papers
Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages in standard LNCS format excluding references and appendices.
Short Papers
- Short papers are also subject to peer review.
- Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues.
- Short paper submissions are limited to 8 pages in standard LNCS format, excluding references.
- The title for short papers must begin with the text "Short Paper:"
- Accepted submissions will be included in the conference proceedings.
Systematization of Knowledge Papers
- SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions.
- SoK paper submissions are limited to 20 pages in standard LNCS format excluding references and appendices.
- The paper title for systematization of knowledge papers must begin with the text "SoK:"
تاریخهای کنفرانس
Conference Date
۲۵ فروردین ۱۴۰۴ → ۲۹ فروردین ۱۴۰۴
- ۲۶ فروردین ۱۴۰۴ - ۲۸ فروردین ۱۴۰۴
ارسال مقاله
Workshop and tutorial submission
۲۳ شهریور ۱۴۰۳
Paper submission
۲۰ مهر ۱۴۰۳
- ۱۷ مهر ۱۴۰۳
اعلان
Workshop and tutorial notification
۶ مهر ۱۴۰۳
Paper notification
۱۶ آذر ۱۴۰۳
نسخه نهایی
Final pre-proceedings papers
۲۶ بهمن ۱۴۰۳
رتبه منبع
منبع: CORE2023
رتبه: A
حوزه پژوهشی: Cybersecurity and privacy