TCC 2016-A: Call for Papers


Submission server:  
Conference site:  

Submission Deadline

   5:00 pm EDT July 13, 2015 

Notification of Decision

  October 2nd, 2015

Proceedings Version Due

  October 26, 2015 (2PM EDT)


  January 10-13, 2016

The Thirteen Theory of Cryptography Conference will be held in Tel-Aviv, Israel, sponsored by the International Association for Cryptologic Research (IACR). Papers presenting original research on foundational and theoretical aspects of cryptography are sought. For more information about TCC, see the TCC manifesto.

The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them. More specifically, the scope of the conference includes, but is not limited to the:

Study of known paradigms, approaches, and techniques, directed towards their better understanding and utilization,

  • Discovery of new paradigms, approaches and techniques that overcome limitations of the existing ones,
  • Formulation and treatment of new cryptographic problems,
  • Study of notions of security and relations among them,
  • Modeling and analysis of cryptographic algorithms, and
  • Study of the complexity assumptions used in cryptography.

The Theory of Cryptography Conference is dedicated to providing a premier venue for the dissemination of results within its scope. The conference aims to provide a meeting place for researchers and to be instrumental in shaping the identity of the theoretical cryptography community.

Instructions for Authors

The submission should begin with a title, followed by the names, affiliations and contact information of all authors, and a short abstract. It should contain a scholarly exposition of ideas, techniques, and results, including motivation and a clear comparison with related work. Submissions should be typeset with 11pt or larger font and reasonable spacing and margins. They should not exceed 12 letter-sized pages, not counting the title page, bibliography and appendices. Reviewers are not required to read appendices; the paper should be intelligible without them. Submissions must not substantially duplicate work that was published elsewhere, or work that any of the authors has submitted in parallel to any other conference or workshop that has proceedings; see the IACR policy on irregular submissions for more information. Authors of accepted papers are expected to present their paper at the conference.

Online posting: Authors are strongly encouraged to post full versions of their submissions in a freely accessible online repository, such as the Cryptology ePrint archive. We encourage the authors to post such a version at the time of submission (in which case the authors should provide a link on the title page of their submission). At the minimum, we expect that authors of accepted papers will post a full version of their papers by the camera-ready deadline. Abstracts of accepted papers will be made public by the PC following notification.

Contacting the Authors

Submissions must include a corresponding author's email contact information. The corresponding author is expected to be available to receive and quickly answer questions (via email) that may arise about their submissions throughout the review period.

Submission instructions

Papers must be submitted electronically through the submission web page. The authors are allowed to revise the paper any number of times before the submission deadline, and only the latest submitted version will be seen by the PC. Therefore, the authors are advised not to wait until the last moment for the initial submission.

Best student paper award

This prize is for the best paper authored solely by students, where a student is a person that is considered a student by the respective institution at the time of the paper's submission. Eligibility must be indicated at the time of submission (using a checkbox in the submission form). The program committee may decline to make the award, or may split it among several papers.


Proceedings will be published in Springer-Verlag's Lecture Notes in Computer Science Series and will be available at the conference. Instructions for preparing the final proceedings version will be sent to the authors of accepted papers. The final copies of the accepted papers will be due on the camera-ready deadline listed above. This is a strict deadline, and authors should prepare accordingly.

Program Committee

Masayuki Abe   (NTT)
Amos Beimel   (Ben-Gurion University)
Nir Bitansky   (MIT)
Andrej Bogdanov   (Chinese University of Hong Kong)
Zvika Brakerski   (Weizmann Institute)
Christina Brzuska   (MSR Cambridge)
Nishanth Chandran   (MSR India)
Melissa Chase   (MSR Redmond)
Dana Dachman-Soled   (UMD)
Yuval Ishai   (Technion)
Jonathan Katz   (UMD)
Hugo Krawczyk   (IBM)
Eyal Kushilevitz   (Technion)   (co-chair)
Huijia (Rachel) Lin   (UCSB)
Tal Malkin   (Columbia University)   (co-chair)
Claudio Orlandi   (Aarhus University)
Omkant Pandey   (Drexel University)
Valerio Pastro   (Columbia University)
Leonid Reyzin   (Boston University)
Guy Rothblum   (Samsung)
Gil Segev   (Hebrew University)
Adam Smith   (Penn State)
Vinod Vaikuntanathan   (MIT)
Ivan Visconti   (University of Salerno)
Brent Waters   (UT Austin)
Vassilis Zikas   (ETH)


General Chairs

Ran Canetti (Tel Aviv University and Boston University), Iftach Haitner   (Tel-Aviv University)

TCC Steering Committee Members

Mihir Bellare, Ivan Damgå, Shafi Goldwasser, Shai Halevi (chair), Russell Impagliazzo, Ueli Maurer, Silvio Micali, Moni Naor, and Tatsuaki Okamoto.

TCC web site: