Generated by GPT-5-mini| International Cryptology Conference | |
|---|---|
| Name | International Cryptology Conference |
| Abbreviation | ICC |
| Status | Active |
| Genre | Academic conference |
| Frequency | Annual |
| Location | Rotating international venues |
| First | 19XX |
| Organizer | Consortium of academic and professional societies |
International Cryptology Conference is a premier annual forum for research and development in cryptography and information security that attracts academics, industry researchers, and practitioners from around the world. The conference serves as a platform for presenting peer‑reviewed papers, exchanging advances in public-key cryptography, symmetric-key cryptography, cryptanalysis, secure protocols, and fostering collaborations among institutions such as Massachusetts Institute of Technology, Stanford University, University of Cambridge, École Polytechnique Fédérale de Lausanne, Technische Universität Darmstadt, University of California, Berkeley, University of Oxford, University of Toronto, Princeton University, Harvard University.
The conference originated in the late 20th century amid a surge in academic events like Advances in Cryptology and regional meetings inspired by early gatherings at Bell Labs, RAND Corporation, Institute of Electrical and Electronics Engineers, and Association for Computing Machinery. Early editions featured contributors from GCHQ, National Security Agency, Government Communications Headquarters, European Union Agency for Cybersecurity, and universities including University of Waterloo, Carnegie Mellon University, University of Maryland, College Park, University College London, ETH Zurich, Tokyo Institute of Technology, Seoul National University, and Tsinghua University. Over time, the conference formalized peer review practices similar to Proceedings of the IEEE and indexing in databases like DBLP, Scopus, Web of Science, and arXiv. Landmark moments paralleled discoveries at forums such as RSA Conference, Crypto, Eurocrypt, Asiacrypt, and Real World Crypto Symposium.
Governance is typically led by a rotating steering committee drawn from organizations including International Association for Cryptologic Research, IEEE Computer Society, ACM SIGSAC, European Laboratory for Learning and Intelligent Systems, National Institute of Standards and Technology, and major academic departments like MIT Computer Science and Artificial Intelligence Laboratory, Stanford Computer Science Department, CNRS, Max Planck Institute for Security and Privacy. Committees manage peer review, chaired program committees echoing structures used by NeurIPS, ICML, SOSP, and USENIX. Administrative functions collaborate with hosts such as University of Edinburgh, University of Tokyo, Australian National University, Indian Institute of Technology Bombay, Peking University, and professional bodies like Internet Engineering Task Force for standards liaison. Ethics and disclosure policies reference norms from Committee on Publication Ethics, Institutional Review Board, OpenAI, and regional legal frameworks such as General Data Protection Regulation and national export-control agencies.
The program spans invited talks, technical sessions, workshops, tutorials, and posters covering topics anchored in milestones from Diffie–Hellman key exchange, RSA (cryptosystem), Elliptic-curve cryptography, Zero-knowledge proof, Homomorphic encryption, Lattice-based cryptography, Multivariate cryptography, Post-quantum cryptography, Side-channel attacks, Differential cryptanalysis, Linear cryptanalysis, Hash functions, Authenticated encryption, Secure multiparty computation, Blockchain technology, Smart contracts, Threshold cryptography, Random oracle model, Provable security, Formal verification, Secure hardware, and Privacy-enhancing technologies. Workshops often mirror specialized meetings like Workshop on Privacy in the Electronic Society, Financial Cryptography and Data Security, and Symposium on Security and Privacy.
Published proceedings have included foundational works extending results from Claude Shannon, Alan Turing, Whitfield Diffie, Martin Hellman, Ron Rivest, Adi Shamir, Leonard Adleman, Taher ElGamal, Shafi Goldwasser, Silvio Micali, Oded Goldreich, Mihir Bellare, Phillip Rogaway, Dan Boneh, Victor Shoup, Niels Provos, David Chaum, Ralph Merkle, Joan Daemen, Vincent Rijmen, Eli Biham, Adi Shamir (duplicate names avoided in citation practices), and contemporary teams from IBM Research, Microsoft Research, Google Research, Intel Labs, Amazon Web Services, Red Hat, NIST Post-Quantum Cryptography Standardization Project, and European Commission Horizon 2020 consortia. Contributions include advances in breaking cipher proposals, proposing standardized schemes akin to AES, SHA-3 competition, and progress on standards reflected in RFCs and national standards bodies like ANSI and ISO/IEC.
Keynote rosters have featured luminaries associated with institutions such as Princeton University, Yale University, Columbia University, Cornell University, Brown University, University of Illinois Urbana–Champaign, University of Michigan, McGill University, University of Sydney, and labs including Bell Labs Research, Mitsubishi Electric Research Laboratories, Bellcore. Awards presented at the conference have honored achievements similar to Turing Award, Gödel Prize, ACM Prize in Computing, RSA Conference Award, and discipline-specific recognitions established by IACR and major funders such as National Science Foundation, European Research Council, Japan Society for the Promotion of Science.
Participants include faculty, postdoctoral researchers, PhD students, engineers from Cisco Systems, Qualcomm, ARM Holdings, Samsung Research, Huawei Technologies, Nokia, Ericsson, cybersecurity firms like Kaspersky Lab, Symantec, CrowdStrike, FireEye, and representatives from government labs including Los Alamos National Laboratory, Lawrence Livermore National Laboratory, Fraunhofer Society, CERN, European Space Agency, and NGOs such as Electronic Frontier Foundation. Membership models parallel professional societies like ACM, IEEE, and IACR, with tiers for institutional subscribers, student members, and corporate partners, and policies to promote diversity inspired by initiatives from Women in Security and Privacy and Association for Women in Computing.
The conference has influenced standardization trajectories at NIST, accelerated adoption of post-quantum candidates by vendors like OpenSSL, LibreSSL, BoringSSL, and shaped threat models deployed by cloud providers such as Google Cloud Platform, Microsoft Azure, Amazon Web Services. It has been instrumental in translating theoretical breakthroughs from labs at ETH Zurich, LIX (École Polytechnique), KTH Royal Institute of Technology, and Weizmann Institute of Science into practical tools used by Mozilla, Apple Inc., Facebook (Meta) and in protocols like TLS, SSH, IPsec, OAuth, and standards such as X.509. The conference ecosystem continues to bridge academia, industry, and policy forums including World Economic Forum, G7 cybersecurity dialogues, and United Nations Office on Drugs and Crime initiatives, shaping the future of secure computation, cryptographic engineering, and privacy technologies.
Category:Cryptography conferences