Crypto 2025

August 17-21, 2025

Santa Barbara, USA

Paper Submission

The submission server is not yet open. Please check back later.

Authors are strongly encouraged to read the call for papers first, then follow the detailed instructions below for submitting papers.

Formatting

The main body of the submission must be at most 30 pages long, followed by references. References do not count towards the 30 page limit. The first 10 pages should contain the main ideas in the paper. Any amount of clearly marked supplementary material may be supplied, either as an appendix to the main body of the paper or in separate files. However, reviewers are not required to read any supplementary material; submissions are expected to be intelligible without supplemental materials.

Important dates

Feb 13, 2025

Submission deadline at 23:59 AoE (anywhere on earth)

May 3, 2025

Final notification

Aug 17, 2025

Conference begins

Submissions must be prepared in LaTeX using the Springer LNCS format and submitted electronically in PDF format. You should not modify the LNCS default fonts, sizes, or margins. More details on the Springer LNCS format are available on their website. All submissions must have page numbers (e.g., using LaTeX command \pagestyle{plain}). The use of BibTeX in conjunction with LNCS's bibliography style splncs04.bst is strongly recommended. The use of CryptoBib is also encouraged.

Submissions not meeting the above guidelines risk rejection without consideration of their merits.

Structure

The submission should begin with a title, a short abstract, and an introduction. There is no requirement to include keywords, but they may be supplied if helpful. The introduction should summarize the contributions of the paper and the relationship to existing work in a manner that is understandable to a general cryptographic audience.

Anonymity

Submissions must be anonymous with no author names, affiliations, or obvious references. The list of authors is requested separately on the submission form; it will be known to the program co-chairs but not made available to the rest of the program committee unless the paper is accepted. Note that, per IACR guidelines for authors, the anonymity requirement does not preclude the authors from posting nonanonymized versions of their work online or talking about it.

Exclusivity

Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to a journal or any other conference/workshop that has proceedings. Accepted submissions may not appear in any other conference or workshop that has proceedings. IACR reserves the right to share information about submissions with other program committees to detect parallel submissions, The IACR policy on irregular submissions will be strictly enforced.

Prior reviews

If the submission was rejected from prior conferences, the authors are encouraged to include in their supplementary materials their responses to prior reviews, as described in the IACR guidelines for authors.

PC member restrictions

Program committee members are allowed to submit one paper if without student co-authors, two papers if at least one of them has a student co-author, and three papers if all of them have student co-authors. Program committee co-chairs are not allowed to submit any papers.

Publication & presentation

The proceedings will be published in Springer's Lecture Notes in Computer Science series and will be available online. The authors of accepted papers are expected to upload their papers to the Cryptology ePrint Archive and will be required to complete the IACR copyright assignment form. At least one of the authors of each accepted paper will be expected to present the paper in person at the conference. Rarely, exceptions to this rule can be made in case of visa problems or illness. The presentations will be recorded during the event and added to the IACR Youtube channel after the conference.