Special Issue on Real-World Cryptography
Articles due to ScholarOne: 2 May 2016
Publication date: November/December 2016
Author guidelines: www.computer.org/web/peer-review/magazines
Cryptography is simultaneously one of the most theoretical areas of computer science and one of the most applied. The theory of cryptography deals with deep philosophical questions such as, What is the nature of secrecy? And what does it mean to know something, or indeed, learn something? These ideas are applied to systems as diverse as the Internet, mobile phones, and banking payment systems. This tug-of-war between theory and practice has resulted in a fractured cryptographic community in which theoreticians and practical security professionals rarely talk to one another.
To fuse crypto theory and practice, this special issue of IEEE Security & Privacy magazine will be devoted to real-world cryptography. We’re looking for articles that highlight how cryptography is used in the real world. Articles that address the following are particularly welcome:
– problems that arise from deploying cryptographic solutions,
– new techniques that solve longstanding cryptographic problems, and
– methodologies that achieve high assurance of cryptographic solutions.
Other topics of interest include
– problems associated with standard protocols, such as TLS and IPSec;
– formal verification and assurance of cryptographic implementations;
– human factors issues related to cryptographic solutions;
– analysis of deploying cryptographic systems at scale;
– side-channel analysis of hardware, software, and cloud environments; and
– systems issues related to cryptography.
All articles should have significant relevance for the cryptographic challenges faced by industry in today’s marketplace.
Submissions will be subject to the IEEE Computer Society’s peer-review process, and if accepted, to the Computer Society editing process. Articles should be at most 6,000 words, with a maximum of 15 references, and should be understandable to a broad audience of people interested in security, privacy and dependability. The writing style should be down-to-earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be edited by a staff editor according to the IEEE Computer Society style guide. Submit your papers to ScholarOne at https://mc.manuscriptcentral.com/cs-ieee.
Contact the guest editors: Dan Boneh (Stanford University, email@example.com), Kenny Patterson (Royal Holloway University of London,firstname.lastname@example.org), and Nigel Smart (University of Bristol, email@example.com).