Conferences and Workshops Related to (Applied) Cryptography (List Incomplete)

  • Annual International Cryptology Conference (CRYPTO 2015)
  • Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2015)
  • International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2015)
  • ACM Conference on Computer and Communications Security (ACM-CCS 2015)
  • IEEE Symposium on Security and Privacy (S&P 2015)
  • IEEE Conference on Communications and Network Security (CNS 2015)
  • USENIX Security Symposium (USENIX 2015)
  • Network and Distributed System Security Symposium (NDSS 2015)
  • International Conference on Practice and Theory in Public Key Cryptography (PKC 2015)
  • International Workshop on Fast Software Encryption (FSE 2015)
  • Theory of Cryptography Conference (TCC 2015)
  • Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015)
  • The Cryptographers' Track at the RSA Conference (CT-RSA 2015)
  • International Conference on Financial Cryptography and Data Security (FC 2015)
  • Annual Workshop on Selected Areas in Cryptography (SAC 2015)
  • China International Conference on Information Security and Cryptology (Inscrypt 2014)
  • Australasian Conference on Information Security and Privacy (ACISP 2015)
  • International Conference on Cryptology in India (INDOCRYPT 2015)
  • International Conference on Cryptology in Africa (AFRICACRYPT 2015)
  • Annual International Conference on Information Security and Cryptology (ICISC 2015)
  • International Conference on Information and Communications Security (ICICS 2015)
  • European Symposium on Research in Computer Security (ESORICS 2015)
  • International Conference on Applied Cryptography and Network Security (ACNS 2015)
  • Information Security Conference (ISC 2014)
  • Information Security Practice and Experience Conference (ISPEC 2015)
  • International Conference on Pairing-based Cryptography (Pairing 2013)
  • International Workshop on the Arithmetic of Finite Fields (WAIFI 2014)
  • International Workshop on Coding and Cryptography (WCC 2015)
  • Symposium on Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC 2009)
  • ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
  • International Conference on Provable Security (ProvSec 2015)
  • ACM Workshop on Information Hiding and Multimedia Security (IH & MMSEC 2015)
  • Privacy Enhancing Technologies Symposium (PETS 2015)
  • International Workshop on RFID Security and Privacy (RFIDSec 2015)
  • IEEE International Conference on RFID (IEEE RFID 2015)
  • Workshop on RFID and IoT Security (RFIDsec'14 Asia)
  • International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE 2015)
  • International Conference on Sequences and Their Applications (SETA 2014)
  • International Workshop in Information Security Theory and Practice (WISTP 2015)
  • International Conference on Security and Cryptography for Networks (SCN 2014)

Journals Related to Security and Privacy (List Incomplete)

  • IEEE Transactions on Computers (TC)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Information Forensics and Security (TIFS)
  • IEEE Transactions on Information Theory (TIT)
  • IEEE Transactions on Mobile Computing (TMC)
  • IEEE/ACM Transactions on Networking (TON)
  • IEEE Transactions on Parallel and Distributed Systems (TPDS)
  • IEEE Journal on Selected Areas in Communications (J-SAC)
  • IEEE Transactions on Vehicular Technology (TVT)
  • IEEE Transactions on Very Large Scale Integration Systems (TVLSIS)
  • IEEE Transactions on Wireless Communications (TWC)
  • Proceedings of the IEEE (PI)
  • ACM Transactions on Embedded Computing Systems (TECS)
  • ACM Transactions on Information and System Security (TISSEC)
  • ACM Transactions on Reconfigurable Technology and Systems (TRETS)
  • ACM Transactions on Sensor Networks (TOSN)
  • ACM Computing Surveys (CSUR)
  • Journal of Cryptology (JC)
  • Journal of Cryptographic Engineering (JCE)
  • Journal of Mathematical Cryptology (JMC)
  • Designs, Codes and Cryptography (DCC)
  • International Journal of Information Security (IJIS)
  • Advances in Mathematics of Communications (AMC)